Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Systems, Networks, and Communications
Volume 2008, Article ID 380468, 8 pages
http://dx.doi.org/10.1155/2008/380468
Research Article

Integrating Usage Control with SIP-Based Communications

1Information Security Track, College of Information Technology, United Arab Emirates (UAE) University, P.O. Box 15551, Al Ain, United Arab Emirates
2Networking Track, College of Information Technology, United Arab Emirates (UAE) University, P.O. Box 15551, Al Ain, United Arab Emirates

Received 25 September 2008; Accepted 8 October 2008

Academic Editor: Abderrahim Benslimane

Copyright © 2008 E. Barka and A. Lakas. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Rosenberg, H. Schulzrinne, G. Camarillo et al., “SIP: Session Initiation Protocol,” Internet Engineering Task Force, RFC3261, June 2002.
  2. 3GPP, “TS 24.228: signaling flows for the IP multimedia call control based on SIP and SDP,” September 2002. View at Google Scholar
  3. IEEE std. 802.11, Wireless Medium Access Control and Physical Layer Specifications, 1999.
  4. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, “Role-based access control models,” Computer, vol. 29, no. 2, pp. 38–47, 1996. View at Publisher · View at Google Scholar
  5. W. Zhou and C. Meinel, “Implement Role-Based Access Control with Attribute Certificates,” Universität Trier, Mathematik-Informatik, Forschungsbericht 03-03, 2003.
  6. W. Stallings, Network Security Essentials, Applications and Standards, Prentice Hall, Upper Saddle River, NJ, USA, 2003.
  7. R. Thomas and R. S. Sandhu, Task-Based Authorization Control (TBAC): Models for Active and Enterprise-Oriented Authorization Management Database Security XI: Status and Prospects, North-Holland, Amsterdam, The Netherlands, 1997.
  8. J. Park and R. S. Sandhu, “The UCONABC usage control model,” ACM Transaction on Information and System Security, vol. 7, no. 1, pp. 128–174, 2004. View at Publisher · View at Google Scholar
  9. J. Park and R. S. Sandhu, “Towards usage control models: beyond traditional access control,” in Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT '02), pp. 57–64, Monterey, Calif, USA, June 2002. View at Publisher · View at Google Scholar
  10. X. Zhang, F. Parisi-Presicce, J. Park, and R. S. Sandhu, “Logical model and specification of usage control,” to appear in ACM Transaction on Information and System Security.
  11. ISO/IEC 10181-3, Information Technology—Open System Interconnection—Security framework for open systems: Access control, http://www.iso.org/.