Allan Jost | Dalhousie University (original) (raw)

Papers by Allan Jost

Research paper thumbnail of Managing Access Control for Presence-Based Services

... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottaw... more ... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottawa, ON, Canada, K1N 6N5 rliscano@ieee.org Allan Jost Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada, B3H 1W5 jost@cs.dal.ca Abstract ...

Research paper thumbnail of Supporting Micro-Mobility with Multi Protocol Handoff Mechanism

In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobilit... more In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobility mechanism for IP micro-mobility, combining the strengths of the Cellular IP and Hawaii IP protocols. The enhancement consists of a modified handoff mechanism, allowing the mobile node to perform handoff at an appropriate time with the more efficient choice of handoff scheme, as a function of the signal strength of the access points. The results show that the proposed mechanism improves both the throughput and the handoff delay by 50% compared to the Cellular IP and Hawaii IP protocols. A T-test analysis shows that this improvement is significant at the 99% confidence interval.

Research paper thumbnail of Session-based service discovery in peer-to-peer communications

Abstract This paper presents an approach for service discovery in session-based peer-to-peer comm... more Abstract This paper presents an approach for service discovery in session-based peer-to-peer communications. It is an approach by which service discovery can be securely extended into the Internet domain for spontaneous collaborative applications, secure in that services ...

Research paper thumbnail of Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems

Mobile Networks and Applications, Jun 19, 2009

Controlling access in pervasive environments is crucial and a significant challenge because users... more Controlling access in pervasive environments is crucial and a significant challenge because users and devices can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access control policies for this type of environment are required to conform to high-level business notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted semantically to maintain proper access control. Therefore, it is necessary to have a formal representation that represents semantics of the contexts, reflects the change of the situation, and can be shared and understood by a policy system. This paper addresses these issues by introducing a context management system that uses a semantic web approach as an underlying mechanism to model and represent semantics of the contexts. The system stores current contexts in a semantic knowledge base which is used

Research paper thumbnail of Using semantic policiesforad-hoccoalition access

... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty o... more ... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty ofEngineering and Applied Sciences, Faculty ofComputer Science, Dalhousie University, Halifax, University ofOntario Institute of Dalhousie University, Halifax, ...

Research paper thumbnail of Using semantic policies for ad-hoc coalition access control

... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty o... more ... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty ofEngineering and Applied Sciences, Faculty ofComputer Science, Dalhousie University, Halifax, University ofOntario Institute of Dalhousie University, Halifax, ...

Research paper thumbnail of Session-Based Service Discovery and Access Control in Peer-to-Peer Communications

Research paper thumbnail of Discovering and Managing Access to Private Services in Collaborative Sessions

IEEE transactions on systems, man, and cybernetics, Nov 1, 2006

Research paper thumbnail of Virtual socket architecture for Internet access using Mobitex

Research paper thumbnail of Supporting Micro-Mobility with Multi Protocol Handoff Mechanism

In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobilit... more In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobility mechanism for IP micro-mobility, combining the strengths of the Cellular IP and Hawaii IP protocols. The enhancement consists of a modified handoff mechanism, allowing the mobile node to perform handoff at an appropriate time with the more efficient choice of handoff scheme, as a function of the signal strength of the access points. The results show that the proposed mechanism improves both the throughput and the handoff delay by 50% compared to the Cellular IP and Hawaii IP protocols. A T-test analysis shows that this improvement is significant at the 99% confidence interval.

Research paper thumbnail of Session-based service discovery in peer-to-peer communications

Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513), 2004

Abstract This paper presents an approach for service discovery in session-based peer-to-peer comm... more Abstract This paper presents an approach for service discovery in session-based peer-to-peer communications. It is an approach by which service discovery can be securely extended into the Internet domain for spontaneous collaborative applications, secure in that services ...

Research paper thumbnail of Session-Based Service Discovery and Access Control in Peer-to-Peer Communications

Lecture Notes in Computer Science, 2004

Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP pr... more Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP provides a flexible and scalable service discovery framework over IP networks. This paper presents an approach for service discovery and access control under session-based peer-to-peer communications. In other words, it is an approach providing mechanisms for restricting unauthorized discovery or access to restricted services. The proposed approach integrates and leverages SLP with Session Initiation Protocol (SIP). Moreover, this approach can be used to share services from a Wireless Personal Area Network (WPAN) like Bluetooth across the Internet domain.

Research paper thumbnail of Graphical parametrised structural descriptions of VLSI devices

Visual Languages, 1993., Proceedings …, 1993

Page 1. Graphical Parametrised Structural Descriptions of VLSI Devices Trevor J. Smedley Allan G.... more Page 1. Graphical Parametrised Structural Descriptions of VLSI Devices Trevor J. Smedley Allan G. Jost School of Computer Science Technical University of Nova Scotia, PO Box 10o0, Halifax, Nova Scotia, Canada B3J 2x4 ...

Research paper thumbnail of Virtual socket architecture for Internet access using Mobitex

Research paper thumbnail of Bridging the Policy Gap in Pervasive Access Control: A Semantic Web Approach

Access control is a means to protect unauthorized access to services. Controlling access in perva... more Access control is a means to protect unauthorized access to services. Controlling access in pervasive environments is crucial and a significant challenge. Users and devices are mobile and can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access policies for these types of situations are required to conform to high-level business agreements. In other words, there needs to be a policy system that fully understands and interprets high-level notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted correctly to maintain proper access control. It is necessary to have a formal representation of the context that can be shared and understood by the policy system. The policy system must also be able to change the access rights in response to a change in the situation. This paper addresses these issues by using a semantic web approach to represent domain knowledge and access control policies in a meaningful way.

Research paper thumbnail of Dynamic Role Assignment Using Semantic Contexts

2009 International Conference on Advanced Information Networking and Applications Workshops, 2009

... Ramrio Liscano and John Finnson Faculty of Engineering and Applied Science University of Onta... more ... Ramrio Liscano and John Finnson Faculty of Engineering and Applied Science University of Ontario Institute of Technology Oshawa, Ontario, Canada Ramiro.Liscano@uoit.ca, John.Finnson@mycampus.uoit.ca ... [16] P. McDaniel, “On context in authorization policy”, In ...

Research paper thumbnail of Using semantic policies for ad-hoc coalition access control

2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, 2006

Coalition access control models are required in order to properly manage access to resources amon... more Coalition access control models are required in order to properly manage access to resources among different collaborating organizations. When these relationships are long term inter-organizational agreements and policies can be established that can satisfy appropriate access to the resources owned by those entities. When these coalitions are spontaneous access rights to resources among the parties in the coalition need to be specified by users and must be context dependant. A good example of this is in ad-hoc collaborative scenarios. Controlling access to private services being shared within the collaborative group is a challenge in these scenarios. This paper presents a semantic web approach in order to represent context that can be shared and used by a policy engine to form dynamic groups based on the context of the situation, as well as manage access to the private web services that each group introduces to the ad-hoc collaborative environment. The approach leverages the distributed policy framework (Rein) built on top of a rule-base reasoner (CWM).

Research paper thumbnail of Managing Access Control for Presence-Based Services

3rd Annual Communication Networks and Services Research Conference (CNSR'05), 2005

... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottaw... more ... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottawa, ON, Canada, K1N 6N5 rliscano@ieee.org Allan Jost Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada, B3H 1W5 jost@cs.dal.ca Abstract ...

Research paper thumbnail of Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems

Mobile Networks and Applications, 2010

Controlling access in pervasive environments is crucial and a significant challenge because users... more Controlling access in pervasive environments is crucial and a significant challenge because users and devices can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access control policies for this type of environment are required to conform to high-level business notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted semantically to maintain proper access control. Therefore, it is necessary to have a formal representation that represents semantics of the contexts, reflects the change of the situation, and can be shared and understood by a policy system. This paper addresses these issues by introducing a context management system that uses a semantic web approach as an underlying mechanism to model and represent semantics of the contexts. The system stores current contexts in a semantic knowledge base which is used

Research paper thumbnail of Discovering and Managing Access to Private Services in Collaborative Sessions

IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2000

An approach that integrates service discovery with the Internet Engineering Task Force session in... more An approach that integrates service discovery with the Internet Engineering Task Force session initiation protocol to support service discovery of private services across a collaborative session is presented. Embedding the service discovery protocol within a session protocol facilitates the discovery of private services in a safe and controlled manner. Access to services is managed by defining local scopes that are shared among participants in the collaborative session. The fundamentals of the approach are presented using a simple two-party scenario and further extended by describing the approach using both central and peer-to-peer collaborative scenarios. Finally, the feasibility of the approach is demonstrated through a proof-of-concept demonstration of the sharing of Bluetooth services located in a private wireless personal area network across a telephone conversation.

Research paper thumbnail of Managing Access Control for Presence-Based Services

... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottaw... more ... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottawa, ON, Canada, K1N 6N5 rliscano@ieee.org Allan Jost Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada, B3H 1W5 jost@cs.dal.ca Abstract ...

Research paper thumbnail of Supporting Micro-Mobility with Multi Protocol Handoff Mechanism

In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobilit... more In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobility mechanism for IP micro-mobility, combining the strengths of the Cellular IP and Hawaii IP protocols. The enhancement consists of a modified handoff mechanism, allowing the mobile node to perform handoff at an appropriate time with the more efficient choice of handoff scheme, as a function of the signal strength of the access points. The results show that the proposed mechanism improves both the throughput and the handoff delay by 50% compared to the Cellular IP and Hawaii IP protocols. A T-test analysis shows that this improvement is significant at the 99% confidence interval.

Research paper thumbnail of Session-based service discovery in peer-to-peer communications

Abstract This paper presents an approach for service discovery in session-based peer-to-peer comm... more Abstract This paper presents an approach for service discovery in session-based peer-to-peer communications. It is an approach by which service discovery can be securely extended into the Internet domain for spontaneous collaborative applications, secure in that services ...

Research paper thumbnail of Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems

Mobile Networks and Applications, Jun 19, 2009

Controlling access in pervasive environments is crucial and a significant challenge because users... more Controlling access in pervasive environments is crucial and a significant challenge because users and devices can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access control policies for this type of environment are required to conform to high-level business notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted semantically to maintain proper access control. Therefore, it is necessary to have a formal representation that represents semantics of the contexts, reflects the change of the situation, and can be shared and understood by a policy system. This paper addresses these issues by introducing a context management system that uses a semantic web approach as an underlying mechanism to model and represent semantics of the contexts. The system stores current contexts in a semantic knowledge base which is used

Research paper thumbnail of Using semantic policiesforad-hoccoalition access

... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty o... more ... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty ofEngineering and Applied Sciences, Faculty ofComputer Science, Dalhousie University, Halifax, University ofOntario Institute of Dalhousie University, Halifax, ...

Research paper thumbnail of Using semantic policies for ad-hoc coalition access control

... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty o... more ... access control Anand Dersingh Ramiro Liscano Allan Jost Faculty ofComputer Science, Faculty ofEngineering and Applied Sciences, Faculty ofComputer Science, Dalhousie University, Halifax, University ofOntario Institute of Dalhousie University, Halifax, ...

Research paper thumbnail of Session-Based Service Discovery and Access Control in Peer-to-Peer Communications

Research paper thumbnail of Discovering and Managing Access to Private Services in Collaborative Sessions

IEEE transactions on systems, man, and cybernetics, Nov 1, 2006

Research paper thumbnail of Virtual socket architecture for Internet access using Mobitex

Research paper thumbnail of Supporting Micro-Mobility with Multi Protocol Handoff Mechanism

In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobilit... more In this paper, we examine micro-mobility protocols, and present a distributed handoff and mobility mechanism for IP micro-mobility, combining the strengths of the Cellular IP and Hawaii IP protocols. The enhancement consists of a modified handoff mechanism, allowing the mobile node to perform handoff at an appropriate time with the more efficient choice of handoff scheme, as a function of the signal strength of the access points. The results show that the proposed mechanism improves both the throughput and the handoff delay by 50% compared to the Cellular IP and Hawaii IP protocols. A T-test analysis shows that this improvement is significant at the 99% confidence interval.

Research paper thumbnail of Session-based service discovery in peer-to-peer communications

Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513), 2004

Abstract This paper presents an approach for service discovery in session-based peer-to-peer comm... more Abstract This paper presents an approach for service discovery in session-based peer-to-peer communications. It is an approach by which service discovery can be securely extended into the Internet domain for spontaneous collaborative applications, secure in that services ...

Research paper thumbnail of Session-Based Service Discovery and Access Control in Peer-to-Peer Communications

Lecture Notes in Computer Science, 2004

Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP pr... more Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP provides a flexible and scalable service discovery framework over IP networks. This paper presents an approach for service discovery and access control under session-based peer-to-peer communications. In other words, it is an approach providing mechanisms for restricting unauthorized discovery or access to restricted services. The proposed approach integrates and leverages SLP with Session Initiation Protocol (SIP). Moreover, this approach can be used to share services from a Wireless Personal Area Network (WPAN) like Bluetooth across the Internet domain.

Research paper thumbnail of Graphical parametrised structural descriptions of VLSI devices

Visual Languages, 1993., Proceedings …, 1993

Page 1. Graphical Parametrised Structural Descriptions of VLSI Devices Trevor J. Smedley Allan G.... more Page 1. Graphical Parametrised Structural Descriptions of VLSI Devices Trevor J. Smedley Allan G. Jost School of Computer Science Technical University of Nova Scotia, PO Box 10o0, Halifax, Nova Scotia, Canada B3J 2x4 ...

Research paper thumbnail of Virtual socket architecture for Internet access using Mobitex

Research paper thumbnail of Bridging the Policy Gap in Pervasive Access Control: A Semantic Web Approach

Access control is a means to protect unauthorized access to services. Controlling access in perva... more Access control is a means to protect unauthorized access to services. Controlling access in pervasive environments is crucial and a significant challenge. Users and devices are mobile and can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access policies for these types of situations are required to conform to high-level business agreements. In other words, there needs to be a policy system that fully understands and interprets high-level notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted correctly to maintain proper access control. It is necessary to have a formal representation of the context that can be shared and understood by the policy system. The policy system must also be able to change the access rights in response to a change in the situation. This paper addresses these issues by using a semantic web approach to represent domain knowledge and access control policies in a meaningful way.

Research paper thumbnail of Dynamic Role Assignment Using Semantic Contexts

2009 International Conference on Advanced Information Networking and Applications Workshops, 2009

... Ramrio Liscano and John Finnson Faculty of Engineering and Applied Science University of Onta... more ... Ramrio Liscano and John Finnson Faculty of Engineering and Applied Science University of Ontario Institute of Technology Oshawa, Ontario, Canada Ramiro.Liscano@uoit.ca, John.Finnson@mycampus.uoit.ca ... [16] P. McDaniel, “On context in authorization policy”, In ...

Research paper thumbnail of Using semantic policies for ad-hoc coalition access control

2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, 2006

Coalition access control models are required in order to properly manage access to resources amon... more Coalition access control models are required in order to properly manage access to resources among different collaborating organizations. When these relationships are long term inter-organizational agreements and policies can be established that can satisfy appropriate access to the resources owned by those entities. When these coalitions are spontaneous access rights to resources among the parties in the coalition need to be specified by users and must be context dependant. A good example of this is in ad-hoc collaborative scenarios. Controlling access to private services being shared within the collaborative group is a challenge in these scenarios. This paper presents a semantic web approach in order to represent context that can be shared and used by a policy engine to form dynamic groups based on the context of the situation, as well as manage access to the private web services that each group introduces to the ad-hoc collaborative environment. The approach leverages the distributed policy framework (Rein) built on top of a rule-base reasoner (CWM).

Research paper thumbnail of Managing Access Control for Presence-Based Services

3rd Annual Communication Networks and Services Research Conference (CNSR'05), 2005

... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottaw... more ... Ramiro Liscano School for Information Technology and Engineering, University of Ottawa, Ottawa, ON, Canada, K1N 6N5 rliscano@ieee.org Allan Jost Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada, B3H 1W5 jost@cs.dal.ca Abstract ...

Research paper thumbnail of Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems

Mobile Networks and Applications, 2010

Controlling access in pervasive environments is crucial and a significant challenge because users... more Controlling access in pervasive environments is crucial and a significant challenge because users and devices can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access control policies for this type of environment are required to conform to high-level business notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted semantically to maintain proper access control. Therefore, it is necessary to have a formal representation that represents semantics of the contexts, reflects the change of the situation, and can be shared and understood by a policy system. This paper addresses these issues by introducing a context management system that uses a semantic web approach as an underlying mechanism to model and represent semantics of the contexts. The system stores current contexts in a semantic knowledge base which is used

Research paper thumbnail of Discovering and Managing Access to Private Services in Collaborative Sessions

IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2000

An approach that integrates service discovery with the Internet Engineering Task Force session in... more An approach that integrates service discovery with the Internet Engineering Task Force session initiation protocol to support service discovery of private services across a collaborative session is presented. Embedding the service discovery protocol within a session protocol facilitates the discovery of private services in a safe and controlled manner. Access to services is managed by defining local scopes that are shared among participants in the collaborative session. The fundamentals of the approach are presented using a simple two-party scenario and further extended by describing the approach using both central and peer-to-peer collaborative scenarios. Finally, the feasibility of the approach is demonstrated through a proof-of-concept demonstration of the sharing of Bluetooth services located in a private wireless personal area network across a telephone conversation.