2008
DOI: 10.1109/tce.2008.4560120
|View full text |Cite
|
Sign up to set email alerts
|

Home gateway operating model using reference monitor for enhanced user comfort and privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Another approach found in the literature is the use of a "Reference Monitor" entity [20], i.e. a home gateway, whose goal is to provide and enforce a collection of access control policies, aiming to help satisfy a user's access, convenience, and privacy requirements.…”
Section: Policy-based Access Controlmentioning
confidence: 99%
“…Another approach found in the literature is the use of a "Reference Monitor" entity [20], i.e. a home gateway, whose goal is to provide and enforce a collection of access control policies, aiming to help satisfy a user's access, convenience, and privacy requirements.…”
Section: Policy-based Access Controlmentioning
confidence: 99%
“…To the best of our knowledge, there is already some previous work on the studies of access control models for home network environment [4,5,6]. These existing access control mechanisms, however, always preserve all the access control policies in the home gateway or the distributed household appliances, and thus they can be broadly generalized into two types of models, namely, the home gateway model and the distributed household appliances model.…”
Section: Related Workmentioning
confidence: 99%
“…Security is imperative for many systems, such as the water-based automatic security marking platform [1] , cognitive radios [2][3][4][5] , smart grid [6] , physical layer [7] , and cloud and fog computing [8] . Moreover, in addition to high-performance packet switching [9,10] , commercial home gateways [11] or switches/routers necessitate high-throughput crypto processors. Also, security is of paramount importance for many consumer electronics [12,13] .…”
Section: Introductionmentioning
confidence: 99%