Abstract
Networks are under control of different authorities because of ownership. To flexibly use capabilities across network borders or to even change border, decisions are needed that effect the autonomy of organizations, which have the authority to control their networks. Co-opetition, on the other hand, where a network of stakeholders co-operate and compete to create maximum value, is one of the most important business perspectives of recent years. To support co-opetition, flexibly use of capabilities across network borders is helpful. Network composition enables to share capabilities between different networks. Determining which capabilities are desired and allowed to be shared is here understood as the result of a composition process. This composition process may encompass negotiations or it can be based on matching predefined profiles. Any non manual, adequately secured composition process between networks of different authorities, however, needs an authorization for such composition to happen between authenticated networked partners. This article presents the approach and procedure for authorizing the negotiations between networks that want to compose to improve the network owner position regarding co-opetition.
Similar content being viewed by others
References
Abley, J., & Bagnulo, M. (2008). Applicability statement for the level 3 Multihoming Shim Protocol. Internet-Draft draft-ietf-shim6-applicability-03, Internet Engineering Task Force, Expired.
Buecker A., Andreas P., Paisley S. (2008) Understanding IT perimeter security. IBM Redbook, IBM
Charkani, N., Cano, M., Svaet, S.-W., & Johnsson, M. (2007). Migration approach of the Ambient Control Space. In Proceedings of the mobile & wireless summit 2007, Budapest, Hungary.
Johnsson, M., Ohlman, B., Surtees, A., Hancock, R., Schoo, P., Ahmed, K., Pittmann, F., Rembarz, R., & Brunner, M. (2007). A future-proof network architecture. In Proceedings of the mobile & wireless summit 2007, Budapest, Hungary.
Johnsson, M., Schieder, A., & Hancock, R. (2007). Final system description. Project Deliverable FP6-CALL4-027662-AN P2/D18-A.4, Ambient Networks Project, December 2007. Retreived from Ambient Networks Project Website http://www.ambient-networks.org/.
Kappler, C., Mendes, P., Prehofer, C., Poyhonen, P., & Zhou, D. (2004). A framework for self-organized network composition. In Proceedings of the 1st IFIP international workshop on autonomic communication. Berlin, Germany.
Kent, S., & Seo, K. (2005). Security Architecture for the Internet Protocol. RFC 4301 (Proposed Standard).
Lee A.J., Winslett M., Basney J., Welch V. (2008) The traust authorization service. ACM Transactions on Information and System Security 11(1): 1–33
Moskowitz, R., & Nikander, P. (2006). RFC 4423: Host Identity Protocol (HIP) Architecture.
Moskowitz, R., Nikander, P., Jokela, P., & Henderson, T. R. (2007). Host Identity Protocol. IETF Internet Draft draft-ietf-hip-base-09, October 2007. Work in progress.
Network Composition Feasibility Study (Release 8). (2006). Technical Report 3GPP TR 22.980 V1.0.0, 3rd Generation Partnership Project.
Niebert, N. (2005). Ambient Networks: A Framework for Mobile Network Cooperation. In DIN ’05: Proceedings of the 1st ACM workshop on dynamic interconnection of networks (pp. 2–6). New York, NY, USA: ACM Press.
Niebert, N., Schieder, A., Zander, J., & Hancock, R. (Eds.). (2007). Ambient Networks: Co-operative Mobile Networking for the Wireless World. Number ISBN: 978-0-470-51103-9. Wiley.
Rembarz, R. (2007). Ambient Control Space Prototype Design. Project Deliverable FP6-CALL4-027662-AN P2/ D17-H.4, Ambient Networks Project, June 2007. Retrived from Ambient Networks Project Website http://www.ambient-networks.org/.
Zhang X., Nakae M., Covington M.J., Sandhu R. (2008) Toward a usage-based security framework for collaborative computing systems. ACM Transactions on Information and System Security 11(1): 1–36
Author information
Authors and Affiliations
Corresponding author
Additional information
The Ambient Networks project work was supported in part by the 6th Framework program of the European Commission. The project Website is http://www.ambient-networks.org/.
Rights and permissions
About this article
Cite this article
Schoo, P. Co-opetition Enabling Security for Cooperative Networks: Authorizing Composition Agreement Negotiations between Ambient Networks. Wireless Pers Commun 49, 415–430 (2009). https://doi.org/10.1007/s11277-009-9696-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-009-9696-1