Skip to main content

Secure and Reliable Communication Infrastructure for a Distributed IT-Federation

  • Conference paper
Mobile Response (Mobile Response 2008)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5424))

Abstract

One of today’s major problems is the lack of detailed and current information on the spot for fire brigades and other action forces (e.g. police). However, access to the distributed information (e.g. location maps of fire hydrants, building plans, air photos) is not always available and has to be requested via paper mail in advance. Particularly, preventive fire protection and reactive fire prevention depending on a high-quality information management, which allows them to arrange a more efficient operation. In order to solve this problem, this paper proposes a design of a secure and reliable role based concept, which permits fast access to confidential information. Furthermore, the technical challenge of the development of such a communication infrastructure is illustrated. A performance analysis of an exemplary Monitoring Service for a distributed IT-Federation is introduced, in which an analytical Boolean Reliability Model is presented as an approach to visualize the bottleneck of a decentralized system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. German Research Project MobisPro, http://www.mobis-pro.de

  2. Wietfeld, C., Wolff, A.: MobileEmerGIS: a wireless-enabled technology platform to efficiently support field forces in protecting critical infrastructure. In: 2007 IEEE Conference on Technologies for Homeland Security, Woburn, USA (May 2007)

    Google Scholar 

  3. Goldack, M.: Lesson learned: From MS Passport to Cardspace, Stephen McGibbon’s Web Journal, Horst Görtz Institute for IT-Security, Ruhr University Bochum (July 2006)

    Google Scholar 

  4. Liberty Alliance Project, http://www.projectliberty.org

  5. Internet2, Shibboleth, http://shibboleth.internet2.edu/

  6. Zhang, X., Li, Q., Qing, S., Zhang, H., Zhang, L.: A decentralized RBAC model and its user role administration. In: International Symposium on Communications and Information Technologies, 2007. ISCIT apos;2007, October 17-19, pp. 1280–1285 (2007)

    Google Scholar 

  7. OASIS Committee Draft, Technical Overview of OASIS Security Assertion Markup Language (SAML) V1.1 (2004)

    Google Scholar 

  8. IETF, The Transport Layer Security (TLS) Protocol Version 1.2, http://www.ietf.org

  9. Zarrar Yousaf, F., Müller, C., Wietfeld, C.: Multi-Hop Discovery of Candidate Access Routers (MHD-CAR) for Fast Moving Mobile Nodes. In: 19th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication (PIMRC), Cannes, France (September 2008)

    Google Scholar 

  10. Stewart, R.: Stream Control Transmission Protocol (2007), http://tools.ietf.org/html/rfc4960

  11. J. A. Project, Apache JMeter, Jakarta Apache Project Homepage (2007), http://jakarta.apache.org/jmeter

  12. Agilent Technologies, http://www.agilent.com

  13. Takeda, Y., Kondo, S., Kitayama, Y., Torato, M., Motegi, T.: Avoidance of performance bottlenecks caused by HTTP redirect. identity management protocols. In: Conference on Computer and Communications Security, Proceeding of the second ACM workshop on Digital identity management, Virgina, USA (2006)

    Google Scholar 

  14. Fratta, L., Montanari, U.: A Boolean algebra method for computing the terminal reliability in a communication network. IEEE Transactions on Circuits Theory 20(3), 203–211 (1973)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tran, T., Daniel, K., Wietfeld, C. (2009). Secure and Reliable Communication Infrastructure for a Distributed IT-Federation. In: Löffler, J., Klann, M. (eds) Mobile Response. Mobile Response 2008. Lecture Notes in Computer Science, vol 5424. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00440-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00440-7_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00439-1

  • Online ISBN: 978-3-642-00440-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics