1. Convergence Interaction for Communication
- Author
-
Joong-Kyung Ryu and Yu-Keum Jeong
- Subjects
business.industry ,Computer science ,020206 networking & telecommunications ,Access control ,Cloud computing ,02 engineering and technology ,Communications system ,Computer security ,computer.software_genre ,Change management (ITSM) ,Mandatory access control ,Computer Science Applications ,0202 electrical engineering, electronic engineering, information engineering ,Role-based access control ,Resource allocation ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,business ,computer ,Personally identifiable information - Abstract
Welcome to this special issue of Wireless Personal Communications. This issue contains a collection of the best papers out of various authors who have been submitted to this issue. The main goal for this issue is to be a timely vehicle for publishing selected research papers from practitioners and academia in convergence industries on this emerging topic. This issue covers some of the hottest topics in Convergence Interaction for Communication, including: convergence; interactive applications; cloud service; P2P architectures and wireless protocols; data and index structures; motion recognition; future communication system; hybrid networking system; spectrum resource allocation; personal networking and architectures; multiple access techniques; multicasting and computer communications. The paper by Mun et al. [1] proposes the injecting of a subject policy into access control to strengthen the protection of personal information. This study provides two confidential access control models that apply individually established policies to the role-based access control model (RBAC) and the mandatory access control model (MAC) technologies. In the SpRBAC model, a user’s right to access would follow organizational policy, and accessing personal information would be restricted by the subject policy. In the SpMAC model, users would have to satisfy the subject policy established by the provider of the information, in addition to the requirements of the normal MAC policy. The paper by Lee et al. [2] presents variability change management using orthogonal variability model-based traceability. The proposed method is an approach to tracing variability based on explicit
- Published
- 2016