Allan Jost | Dalhousie University (original) (raw)
Papers by Allan Jost
... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottaw... more ... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottawa, ON, Canada, K1N 6N5 rliscano@ieee.org Allan Jost Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada, B3H 1W5 jost@cs.dal.ca Abstract ...
In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobilit... more In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobility mechanism for IP micro-mobility, combining the strengths of the Cellular IP and Hawaii IP protocols. The enhancement consists of a modified handoff mechanism, allowing the mobile node to perform handoff at an appropriate time with the more efficient choice of handoff scheme, as a function of the signal strength of the access points. The results show that the proposed mechanism improves both the throughput and the handoff delay by 50% compared to the Cellular IP and Hawaii IP protocols. A T-test analysis shows that this improvement is significant at the 99% confidence interval.
Abstract This paper presents an approach for service discovery in session-based peer-to-peer comm... more Abstract This paper presents an approach for service discovery in session-based peer-to-peer communications. It is an approach by which service discovery can be securely extended into the Internet domain for spontaneous collaborative applications, secure in that services ...
Mobile Networks and Applications, Jun 19, 2009
Controlling access in pervasive environments is crucial and a significant challenge because users... more Controlling access in pervasive environments is crucial and a significant challenge because users and devices can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access control policies for this type of environment are required to conform to high-level business notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted semantically to maintain proper access control. Therefore, it is necessary to have a formal representation that represents semantics of the contexts, reflects the change of the situation, and can be shared and understood by a policy system. This paper addresses these issues by introducing a context management system that uses a semantic web approach as an underlying mechanism to model and represent semantics of the contexts. The system stores current contexts in a semantic knowledge base which is used
... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty o... more ... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty ofEngineering and Applied Sciences, Faculty ofComputer Science, Dalhousie University, Halifax, University ofOntario Institute of Dalhousie University, Halifax, ...
... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty o... more ... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty ofEngineering and Applied Sciences, Faculty ofComputer Science, Dalhousie University, Halifax, University ofOntario Institute of Dalhousie University, Halifax, ...
IEEE transactions on systems, man, and cybernetics, Nov 1, 2006
In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobilit... more In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobility mechanism for IP micro-mobility, combining the strengths of the Cellular IP and Hawaii IP protocols. The enhancement consists of a modified handoff mechanism, allowing the mobile node to perform handoff at an appropriate time with the more efficient choice of handoff scheme, as a function of the signal strength of the access points. The results show that the proposed mechanism improves both the throughput and the handoff delay by 50% compared to the Cellular IP and Hawaii IP protocols. A T-test analysis shows that this improvement is significant at the 99% confidence interval.
Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513), 2004
Abstract This paper presents an approach for service discovery in session-based peer-to-peer comm... more Abstract This paper presents an approach for service discovery in session-based peer-to-peer communications. It is an approach by which service discovery can be securely extended into the Internet domain for spontaneous collaborative applications, secure in that services ...
Lecture Notes in Computer Science, 2004
Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP pr... more Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP provides a flexible and scalable service discovery framework over IP networks. This paper presents an approach for service discovery and access control under session-based peer-to-peer communications. In other words, it is an approach providing mechanisms for restricting unauthorized discovery or access to restricted services. The proposed approach integrates and leverages SLP with Session Initiation Protocol (SIP). Moreover, this approach can be used to share services from a Wireless Personal Area Network (WPAN) like Bluetooth across the Internet domain.
Visual Languages, 1993., Proceedings …, 1993
Page 1. Graphical Parametrised Structural Descriptions of VLSI Devices Trevor J. Smedley Allan G.... more Page 1. Graphical Parametrised Structural Descriptions of VLSI Devices Trevor J. Smedley Allan G. Jost School of Computer Science Technical University of Nova Scotia, PO Box 10o0, Halifax, Nova Scotia, Canada B3J 2x4 ...
Access control is a means to protect unauthorized access to services. Controlling access in perva... more Access control is a means to protect unauthorized access to services. Controlling access in pervasive environments is crucial and a significant challenge. Users and devices are mobile and can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access policies for these types of situations are required to conform to high-level business agreements. In other words, there needs to be a policy system that fully understands and interprets high-level notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted correctly to maintain proper access control. It is necessary to have a formal representation of the context that can be shared and understood by the policy system. The policy system must also be able to change the access rights in response to a change in the situation. This paper addresses these issues by using a semantic web approach to represent domain knowledge and access control policies in a meaningful way.
2009 International Conference on Advanced Information Networking and Applications Workshops, 2009
... Ramrio Liscano and John Finnson Faculty of Engineering and Applied Science University of Onta... more ... Ramrio Liscano and John Finnson Faculty of Engineering and Applied Science University of Ontario Institute of Technology Oshawa, Ontario, Canada Ramiro.Liscano@uoit.ca, John.Finnson@mycampus.uoit.ca ... [16] P. McDaniel, On context in authorization policy, In ...
2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, 2006
Coalition access control models are required in order to properly manage access to resources amon... more Coalition access control models are required in order to properly manage access to resources among different collaborating organizations. When these relationships are long term inter-organizational agreements and policies can be established that can satisfy appropriate access to the resources owned by those entities. When these coalitions are spontaneous access rights to resources among the parties in the coalition need to be specified by users and must be context dependant. A good example of this is in ad-hoc collaborative scenarios. Controlling access to private services being shared within the collaborative group is a challenge in these scenarios. This paper presents a semantic web approach in order to represent context that can be shared and used by a policy engine to form dynamic groups based on the context of the situation, as well as manage access to the private web services that each group introduces to the ad-hoc collaborative environment. The approach leverages the distributed policy framework (Rein) built on top of a rule-base reasoner (CWM).
3rd Annual Communication Networks and Services Research Conference (CNSR'05), 2005
... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottaw... more ... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottawa, ON, Canada, K1N 6N5 rliscano@ieee.org Allan Jost Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada, B3H 1W5 jost@cs.dal.ca Abstract ...
Mobile Networks and Applications, 2010
Controlling access in pervasive environments is crucial and a significant challenge because users... more Controlling access in pervasive environments is crucial and a significant challenge because users and devices can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access control policies for this type of environment are required to conform to high-level business notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted semantically to maintain proper access control. Therefore, it is necessary to have a formal representation that represents semantics of the contexts, reflects the change of the situation, and can be shared and understood by a policy system. This paper addresses these issues by introducing a context management system that uses a semantic web approach as an underlying mechanism to model and represent semantics of the contexts. The system stores current contexts in a semantic knowledge base which is used
IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2000
An approach that integrates service discovery with the Internet Engineering Task Force session in... more An approach that integrates service discovery with the Internet Engineering Task Force session initiation protocol to support service discovery of private services across a collaborative session is presented. Embedding the service discovery protocol within a session protocol facilitates the discovery of private services in a safe and controlled manner. Access to services is managed by defining local scopes that are shared among participants in the collaborative session. The fundamentals of the approach are presented using a simple two-party scenario and further extended by describing the approach using both central and peer-to-peer collaborative scenarios. Finally, the feasibility of the approach is demonstrated through a proof-of-concept demonstration of the sharing of Bluetooth services located in a private wireless personal area network across a telephone conversation.
... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottaw... more ... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottawa, ON, Canada, K1N 6N5 rliscano@ieee.org Allan Jost Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada, B3H 1W5 jost@cs.dal.ca Abstract ...
In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobilit... more In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobility mechanism for IP micro-mobility, combining the strengths of the Cellular IP and Hawaii IP protocols. The enhancement consists of a modified handoff mechanism, allowing the mobile node to perform handoff at an appropriate time with the more efficient choice of handoff scheme, as a function of the signal strength of the access points. The results show that the proposed mechanism improves both the throughput and the handoff delay by 50% compared to the Cellular IP and Hawaii IP protocols. A T-test analysis shows that this improvement is significant at the 99% confidence interval.
Abstract This paper presents an approach for service discovery in session-based peer-to-peer comm... more Abstract This paper presents an approach for service discovery in session-based peer-to-peer communications. It is an approach by which service discovery can be securely extended into the Internet domain for spontaneous collaborative applications, secure in that services ...
Mobile Networks and Applications, Jun 19, 2009
Controlling access in pervasive environments is crucial and a significant challenge because users... more Controlling access in pervasive environments is crucial and a significant challenge because users and devices can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access control policies for this type of environment are required to conform to high-level business notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted semantically to maintain proper access control. Therefore, it is necessary to have a formal representation that represents semantics of the contexts, reflects the change of the situation, and can be shared and understood by a policy system. This paper addresses these issues by introducing a context management system that uses a semantic web approach as an underlying mechanism to model and represent semantics of the contexts. The system stores current contexts in a semantic knowledge base which is used
... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty o... more ... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty ofEngineering and Applied Sciences, Faculty ofComputer Science, Dalhousie University, Halifax, University ofOntario Institute of Dalhousie University, Halifax, ...
... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty o... more ... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty ofEngineering and Applied Sciences, Faculty ofComputer Science, Dalhousie University, Halifax, University ofOntario Institute of Dalhousie University, Halifax, ...
IEEE transactions on systems, man, and cybernetics, Nov 1, 2006
In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobilit... more In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobility mechanism for IP micro-mobility, combining the strengths of the Cellular IP and Hawaii IP protocols. The enhancement consists of a modified handoff mechanism, allowing the mobile node to perform handoff at an appropriate time with the more efficient choice of handoff scheme, as a function of the signal strength of the access points. The results show that the proposed mechanism improves both the throughput and the handoff delay by 50% compared to the Cellular IP and Hawaii IP protocols. A T-test analysis shows that this improvement is significant at the 99% confidence interval.
Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513), 2004
Abstract This paper presents an approach for service discovery in session-based peer-to-peer comm... more Abstract This paper presents an approach for service discovery in session-based peer-to-peer communications. It is an approach by which service discovery can be securely extended into the Internet domain for spontaneous collaborative applications, secure in that services ...
Lecture Notes in Computer Science, 2004
Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP pr... more Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP provides a flexible and scalable service discovery framework over IP networks. This paper presents an approach for service discovery and access control under session-based peer-to-peer communications. In other words, it is an approach providing mechanisms for restricting unauthorized discovery or access to restricted services. The proposed approach integrates and leverages SLP with Session Initiation Protocol (SIP). Moreover, this approach can be used to share services from a Wireless Personal Area Network (WPAN) like Bluetooth across the Internet domain.
Visual Languages, 1993., Proceedings …, 1993
Page 1. Graphical Parametrised Structural Descriptions of VLSI Devices Trevor J. Smedley Allan G.... more Page 1. Graphical Parametrised Structural Descriptions of VLSI Devices Trevor J. Smedley Allan G. Jost School of Computer Science Technical University of Nova Scotia, PO Box 10o0, Halifax, Nova Scotia, Canada B3J 2x4 ...
Access control is a means to protect unauthorized access to services. Controlling access in perva... more Access control is a means to protect unauthorized access to services. Controlling access in pervasive environments is crucial and a significant challenge. Users and devices are mobile and can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access policies for these types of situations are required to conform to high-level business agreements. In other words, there needs to be a policy system that fully understands and interprets high-level notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted correctly to maintain proper access control. It is necessary to have a formal representation of the context that can be shared and understood by the policy system. The policy system must also be able to change the access rights in response to a change in the situation. This paper addresses these issues by using a semantic web approach to represent domain knowledge and access control policies in a meaningful way.
2009 International Conference on Advanced Information Networking and Applications Workshops, 2009
... Ramrio Liscano and John Finnson Faculty of Engineering and Applied Science University of Onta... more ... Ramrio Liscano and John Finnson Faculty of Engineering and Applied Science University of Ontario Institute of Technology Oshawa, Ontario, Canada Ramiro.Liscano@uoit.ca, John.Finnson@mycampus.uoit.ca ... [16] P. McDaniel, On context in authorization policy, In ...
2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, 2006
Coalition access control models are required in order to properly manage access to resources amon... more Coalition access control models are required in order to properly manage access to resources among different collaborating organizations. When these relationships are long term inter-organizational agreements and policies can be established that can satisfy appropriate access to the resources owned by those entities. When these coalitions are spontaneous access rights to resources among the parties in the coalition need to be specified by users and must be context dependant. A good example of this is in ad-hoc collaborative scenarios. Controlling access to private services being shared within the collaborative group is a challenge in these scenarios. This paper presents a semantic web approach in order to represent context that can be shared and used by a policy engine to form dynamic groups based on the context of the situation, as well as manage access to the private web services that each group introduces to the ad-hoc collaborative environment. The approach leverages the distributed policy framework (Rein) built on top of a rule-base reasoner (CWM).
3rd Annual Communication Networks and Services Research Conference (CNSR'05), 2005
... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottaw... more ... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottawa, ON, Canada, K1N 6N5 rliscano@ieee.org Allan Jost Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada, B3H 1W5 jost@cs.dal.ca Abstract ...
Mobile Networks and Applications, 2010
Controlling access in pervasive environments is crucial and a significant challenge because users... more Controlling access in pervasive environments is crucial and a significant challenge because users and devices can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access control policies for this type of environment are required to conform to high-level business notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted semantically to maintain proper access control. Therefore, it is necessary to have a formal representation that represents semantics of the contexts, reflects the change of the situation, and can be shared and understood by a policy system. This paper addresses these issues by introducing a context management system that uses a semantic web approach as an underlying mechanism to model and represent semantics of the contexts. The system stores current contexts in a semantic knowledge base which is used
IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2000
An approach that integrates service discovery with the Internet Engineering Task Force session in... more An approach that integrates service discovery with the Internet Engineering Task Force session initiation protocol to support service discovery of private services across a collaborative session is presented. Embedding the service discovery protocol within a session protocol facilitates the discovery of private services in a safe and controlled manner. Access to services is managed by defining local scopes that are shared among participants in the collaborative session. The fundamentals of the approach are presented using a simple two-party scenario and further extended by describing the approach using both central and peer-to-peer collaborative scenarios. Finally, the feasibility of the approach is demonstrated through a proof-of-concept demonstration of the sharing of Bluetooth services located in a private wireless personal area network across a telephone conversation.