Abstract
One of today’s major problems is the lack of detailed and current information on the spot for fire brigades and other action forces (e.g. police). However, access to the distributed information (e.g. location maps of fire hydrants, building plans, air photos) is not always available and has to be requested via paper mail in advance. Particularly, preventive fire protection and reactive fire prevention depending on a high-quality information management, which allows them to arrange a more efficient operation. In order to solve this problem, this paper proposes a design of a secure and reliable role based concept, which permits fast access to confidential information. Furthermore, the technical challenge of the development of such a communication infrastructure is illustrated. A performance analysis of an exemplary Monitoring Service for a distributed IT-Federation is introduced, in which an analytical Boolean Reliability Model is presented as an approach to visualize the bottleneck of a decentralized system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
German Research Project MobisPro, http://www.mobis-pro.de
Wietfeld, C., Wolff, A.: MobileEmerGIS: a wireless-enabled technology platform to efficiently support field forces in protecting critical infrastructure. In: 2007 IEEE Conference on Technologies for Homeland Security, Woburn, USA (May 2007)
Goldack, M.: Lesson learned: From MS Passport to Cardspace, Stephen McGibbon’s Web Journal, Horst Görtz Institute for IT-Security, Ruhr University Bochum (July 2006)
Liberty Alliance Project, http://www.projectliberty.org
Internet2, Shibboleth, http://shibboleth.internet2.edu/
Zhang, X., Li, Q., Qing, S., Zhang, H., Zhang, L.: A decentralized RBAC model and its user role administration. In: International Symposium on Communications and Information Technologies, 2007. ISCIT apos;2007, October 17-19, pp. 1280–1285 (2007)
OASIS Committee Draft, Technical Overview of OASIS Security Assertion Markup Language (SAML) V1.1 (2004)
IETF, The Transport Layer Security (TLS) Protocol Version 1.2, http://www.ietf.org
Zarrar Yousaf, F., Müller, C., Wietfeld, C.: Multi-Hop Discovery of Candidate Access Routers (MHD-CAR) for Fast Moving Mobile Nodes. In: 19th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication (PIMRC), Cannes, France (September 2008)
Stewart, R.: Stream Control Transmission Protocol (2007), http://tools.ietf.org/html/rfc4960
J. A. Project, Apache JMeter, Jakarta Apache Project Homepage (2007), http://jakarta.apache.org/jmeter
Agilent Technologies, http://www.agilent.com
Takeda, Y., Kondo, S., Kitayama, Y., Torato, M., Motegi, T.: Avoidance of performance bottlenecks caused by HTTP redirect. identity management protocols. In: Conference on Computer and Communications Security, Proceeding of the second ACM workshop on Digital identity management, Virgina, USA (2006)
Fratta, L., Montanari, U.: A Boolean algebra method for computing the terminal reliability in a communication network. IEEE Transactions on Circuits Theory 20(3), 203–211 (1973)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tran, T., Daniel, K., Wietfeld, C. (2009). Secure and Reliable Communication Infrastructure for a Distributed IT-Federation. In: Löffler, J., Klann, M. (eds) Mobile Response. Mobile Response 2008. Lecture Notes in Computer Science, vol 5424. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00440-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-00440-7_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00439-1
Online ISBN: 978-3-642-00440-7
eBook Packages: Computer ScienceComputer Science (R0)