Role-based Access Control Model in Home Network Environments

被引:0
|
作者
Kim, Do-Woo [1 ]
Kim, Geon Woo [1 ]
Lee, Jun-Ho [1 ]
Han, Jong-Wook [1 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305606, South Korea
关键词
Home Network; Access Control; RBAC; Security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The home in these days has not one computer connected to the Internet but rather a network of many devices within the home, and that network might be connected to the Internet. In such an environment, the potential for attacks is greatly increased. The general security technology can not apply because of the use of various wired and wireless network, middleware and protocol in digital home environment and a restricted system resource of home information appliances. To offer secure home services home network environments have need of access control for various home devices and information when users want to access. Therefore home network access control for user authorization is a very important issue. In this paper we propose access control model using RBAC in home network environments to provide home users with secure home services.
引用
下载
收藏
页码:97 / 99
页数:3
相关论文
共 50 条
  • [31] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    International Journal of Information Security, 2008, 7 : 123 - 136
  • [32] Spatial role-based access control model for wireless networks
    Hansen, F
    Oleshchuk, V
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2093 - 2097
  • [33] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [34] Role-based access control in JavaTM
    Fondazione Ugo Bordoni, Roma, Italy
    Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
  • [35] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [36] Generalized Role-Based Access Control
    Moyer, MJ
    Ahamad, M
    21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398
  • [37] Fuzzy Role-Based Access Control
    Martinez-Garcia, Carles
    Navarro-Arribas, Guillermo
    Borrell, Joan
    INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
  • [38] An Extended Role-Based Access Control Model for CSCW Systems
    Chen, Bing
    MACHINING AND ADVANCED MANUFACTURING TECHNOLOGY X, 2010, 431-432 : 577 - 582
  • [39] A generalized temporal and spatial role-based access control model
    Chen H.-C.
    Wang S.-J.
    Wen J.-H.
    Huang Y.-F.
    Chen C.-W.
    Journal of Networks, 2010, 5 (08) : 912 - 920
  • [40] Integrating Role-Based Access Control Model with Web Server
    Li, Celia
    Yang, Cungang
    Qin, Ling
    Yang, Yiguang
    2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 615 - 618