Role-based Access Control Model in Home Network Environments

被引:0
|
作者
Kim, Do-Woo [1 ]
Kim, Geon Woo [1 ]
Lee, Jun-Ho [1 ]
Han, Jong-Wook [1 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305606, South Korea
关键词
Home Network; Access Control; RBAC; Security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The home in these days has not one computer connected to the Internet but rather a network of many devices within the home, and that network might be connected to the Internet. In such an environment, the potential for attacks is greatly increased. The general security technology can not apply because of the use of various wired and wireless network, middleware and protocol in digital home environment and a restricted system resource of home information appliances. To offer secure home services home network environments have need of access control for various home devices and information when users want to access. Therefore home network access control for user authorization is a very important issue. In this paper we propose access control model using RBAC in home network environments to provide home users with secure home services.
引用
下载
收藏
页码:97 / 99
页数:3
相关论文
共 50 条
  • [1] A Novel Role-based Access Control Model in Cloud Environments
    Jun Luo
    Hongjun Wang
    Xun Gong
    Tianrui Li
    International Journal of Computational Intelligence Systems, 2016, 9 : 1 - 9
  • [2] A Novel Role-based Access Control Model in Cloud Environments
    Luo, Jun
    Wang, Hongjun
    Gong, Xun
    Li, Tianrui
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (01) : 1 - 9
  • [3] An object oriented role-based access control model for secure domain environments
    Department of Electrical and Computer Engineering, Ryerson University, Toronto, ON, M5B 2K3, Canada
    Int. J. Netw. Secur., 2007, 1 (10-16):
  • [4] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [5] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [6] Role-based access control using neural network
    Chae, SH
    Kim, W
    Kim, DK
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 36 - 40
  • [7] A Semantic-Aware Role-Based Access Control Model for Pervasive Computing Environments
    Javadi, Seyyed Ahmad
    Amini, Morteza
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 5 (02): : 119 - 140
  • [8] Security Policy Integration based on Role-Based Access Control Model in Healthcare Collaborative Environments
    Kuang, Teo Poh
    Ibrahim, Hamidah
    PROCEEDINGS OF KNOWLEDGE MANAGEMENT 5TH INTERNATIONAL CONFERENCE 2010, 2010, : 553 - 559
  • [9] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [10] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282