Security policy specification for home network Online publication date: Tue, 22-Sep-2009
by Geon Woo Kim, Deok Gyu Lee, Jong Wook Han, Sang Wook Kim
International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vol. 4, No. 6, 2009
Abstract: As home network is expanding into ubiquitous computing environment and numerous home network services are available, we need to protect home network system from illegal accesses and a variety of threats. Home network is exposed to various cyber attacks of internet, involving hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping since it is connected to internet. So in this paper, we propose a new specification for security policy on home network for guaranteeing reliability and availability including authentication, authorisation and security policy deployment.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com