A context-based and associated access control model in pervasive computing environment

被引:0
|
作者
Li, Ying [1 ]
Tong, Weiqin [1 ]
Zhi, Xiaoli [1 ]
机构
[1] Shanghai Univ, Sch Engn & Comp Sci, Shanghai, Peoples R China
关键词
pervasive computing; context; access control; CAAC model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the features of access control in pervasive computing environment are summarized and the limitations of previous models are discussed. Then, a context- based and associated access control model is proposed, which integrates the principles of TBAC and RBAC and uses the environment context as a factor to reason role assigning and authority granting. The proposed model shows effectiveness in simplifying the procedures of access control and ensuring security. It also improves the flexibility and intelligence of access control, and those are the prerequisite of the transparency service. The structure of the proposed model and related definitions are described in this paper. Finally the design and implementation of the prototype system based on the model are also put forward.
引用
收藏
页码:143 / 146
页数:4
相关论文
共 50 条
  • [1] A context-based delegation access control model for pervasive computing
    Liscano, Ramiro
    Wang, Kaining
    [J]. 21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 44 - +
  • [2] Context-based secure resource access in pervasive computing environments
    Tripathi, A
    Ahmed, T
    Kulkarni, D
    Kumar, R
    Kashiramka, K
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 159 - 163
  • [3] Pervasive computing context access control based on UCONABC model
    Pu, Fang
    Sun, Daoqin
    Cao, Qiying
    Cai, Haibin
    Yang, Fan
    [J]. IIH-MSP: 2006 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2006, : 689 - +
  • [4] A context, rule and role-based access control model in enterprise pervasive computing environment
    Huang, Xianzhi
    Wang, Haiyang
    Chen, Zhenxiang
    Lin, Jinjiao
    [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 497 - +
  • [5] Context-based media adaptation in Pervasive Computing
    Lei, ZJ
    Georganas, ND
    [J]. CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING 2001, VOLS I AND II, CONFERENCE PROCEEDINGS, 2001, : 913 - 918
  • [6] Using Context Quality Indicators for Improving Context-based Access Control in Pervasive Environments
    Bringel Filho, Jose
    Martin, Herve
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 285 - 290
  • [7] Privacy challenges in Context-sensitive access control for pervasive computing environment
    Ahamed, Sheikh I.
    Talukder, Nilothpal
    Haque, Md. Munirul
    [J]. 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 510 - 515
  • [8] A context-aware access control model for pervasive computing environments
    Emami, Sareh Sadat
    Amini, Morteza
    Zokaei, Saadan
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 51 - +
  • [9] Context-based Access Control Model for Smart Space
    Smirnov, Alexander
    Kashevnik, Alexey
    Shilov, Nikolay
    Teslya, Nikolay
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [10] Security Access Model in Pervasive Computing Environment
    Zhou, Yan-Wei
    Yang, Bo
    Zhang, Wen-Zheng
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (04): : 959 - 965