Role-based Access Control Model in Home Network Environments

被引:0
|
作者
Kim, Do-Woo [1 ]
Kim, Geon Woo [1 ]
Lee, Jun-Ho [1 ]
Han, Jong-Wook [1 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305606, South Korea
关键词
Home Network; Access Control; RBAC; Security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The home in these days has not one computer connected to the Internet but rather a network of many devices within the home, and that network might be connected to the Internet. In such an environment, the potential for attacks is greatly increased. The general security technology can not apply because of the use of various wired and wireless network, middleware and protocol in digital home environment and a restricted system resource of home information appliances. To offer secure home services home network environments have need of access control for various home devices and information when users want to access. Therefore home network access control for user authorization is a very important issue. In this paper we propose access control model using RBAC in home network environments to provide home users with secure home services.
引用
下载
收藏
页码:97 / 99
页数:3
相关论文
共 50 条
  • [41] Migrating to role-based access control
    Brooks, K
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
  • [42] Study of Role-based Access Control
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
  • [43] Enterprise model as a basis of administration on role-based access control
    Oh, S
    Park, S
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON COOPERATIVE DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2000, : 150 - 158
  • [44] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [45] Centralized Role-Based Access Control for Federated Multi-Domain Environments
    MUDAR Sarem
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1688 - 1692
  • [46] A Purpose-Involved Role-Based Access Control Model
    Wang, Yingjie
    Zhou, Zhihong
    Li, Jianhua
    FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2013), 2014, 277 : 1119 - 1131
  • [47] Consistency maintenance for constraint in role-based access control model
    韩伟力
    陈刚
    董金祥
    尹建伟
    Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2002, (03) : 43 - 48
  • [48] A privacy enhanced role-based access control model for enterprises
    Yang, CG
    Zhang, CN
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1012 - 1021
  • [49] AMTRAC: An administrative model for temporal role-based access control
    Sharma, Manisha
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    COMPUTERS & SECURITY, 2013, 39 : 201 - 218
  • [50] An Extended Role-Based Access Control Model for Delegating Obligations
    Ben-Ghorbel-Talbi, Meriam
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Bouhoula, Adel
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2009, 5695 : 127 - +