Role-based access control model for ubiquitous computing environment

被引:0
|
作者
Chae, SH
Kim, W [1 ]
Kim, DK
机构
[1] Sejong Univ, Coll Elect & Informat Engn, Seoul, South Korea
[2] Ajou Univ, Grad Sch Informat & Commun, Suwon 441749, South Korea
[3] Ajou Univ, Coll Informat & Comp Engn, Suwon 441749, South Korea
来源
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ubiquitous computing is characterized by freedom of movement in both time and location, which means users expect to receive services anytime and anywhere. Therefore, the security service should consider the factor of location and time. As a basic authorization service mechanism, RBAC has been used in the security community for access control model. In order to apply RBAC to ubiquitous computing environment, it is necessary to add both location and time dimension. In this paper, we propose new access control model supporting time and location dimensions. The proposed access control model can effectively support various ubiquitous computing environments.
引用
收藏
页码:354 / 363
页数:10
相关论文
共 50 条
  • [1] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment
    Bai, Xin
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20
  • [2] A context, rule and role-based access control model in enterprise pervasive computing environment
    Huang, Xianzhi
    Wang, Haiyang
    Chen, Zhenxiang
    Lin, Jinjiao
    [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 497 - +
  • [3] uT-RBAC: Ubiquitous role-based access control model
    Chae, SH
    Kim, W
    Kim, DK
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
  • [4] New role-based access control in ubiquitous e-business environment
    Oh, Sejong
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2010, 21 (05) : 607 - 612
  • [5] New role-based access control in ubiquitous e-business environment
    Sejong Oh
    [J]. Journal of Intelligent Manufacturing, 2010, 21 : 607 - 612
  • [6] Application of Role-Based Access Control for Web Environment
    Robles, Rosslin John
    Choi, Min-Kyu
    Yeo, Sang-Soo
    Kim, Tai-hoon
    [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 171 - +
  • [7] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [8] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [9] Extended role-based access control model supporting authorization for collaboration environment
    Liu, TT
    Zhang, YL
    Wang, HF
    [J]. Proceedings of the International Conference on Mechanical Engineering and Mechanics 2005, Vols 1 and 2, 2005, : 1238 - 1243
  • [10] A Trusted Role-Based Access Control Model for Dynamic Collaboration in a Federated Environment
    Lianzhong, Liu
    Peng, Liu
    [J]. 2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 181 - 186