A context-based and associated access control model in pervasive computing environment

被引:0
|
作者
Li, Ying [1 ]
Tong, Weiqin [1 ]
Zhi, Xiaoli [1 ]
机构
[1] Shanghai Univ, Sch Engn & Comp Sci, Shanghai, Peoples R China
关键词
pervasive computing; context; access control; CAAC model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the features of access control in pervasive computing environment are summarized and the limitations of previous models are discussed. Then, a context- based and associated access control model is proposed, which integrates the principles of TBAC and RBAC and uses the environment context as a factor to reason role assigning and authority granting. The proposed model shows effectiveness in simplifying the procedures of access control and ensuring security. It also improves the flexibility and intelligence of access control, and those are the prerequisite of the transparency service. The structure of the proposed model and related definitions are described in this paper. Finally the design and implementation of the prototype system based on the model are also put forward.
引用
收藏
页码:143 / 146
页数:4
相关论文
共 50 条
  • [21] Research on Mobile-Agent Based Data Access Model in Pervasive Computing Environment
    Li Fan
    Jiang WeiJian
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1523 - +
  • [22] An XML Based Access Control Architecture for Pervasive Computing
    Molla, Mohammad M.
    Madiraju, Praveen
    Malladi, Srilaxmi
    Ahamed, Sheikh Iqbal
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 803 - +
  • [23] A Quality-Aware Context-Based Access Control Model for Ubiquitous Applications
    Bringel Filho, Jose
    Martin, Herve
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 115 - 120
  • [24] Context-based access control management in ubiquitous environments
    Corradi, A
    Montanari, R
    Tibaldi, D
    [J]. THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 253 - 260
  • [25] Context-Based Access Control Systems for Mobile Devices
    Shebaro, Bilal
    Oluwatimi, Oyindamola
    Bertino, Elisa
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (02) : 150 - 163
  • [26] Semantic-based Obligation for Context-Based Access Control
    Al-Wahah, Mouiad
    Saaudi, Ahmed
    Farkas, Csilla
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 535 - 540
  • [27] Context-Based Conflict Management in Pervasive Platforms
    Ben Hadj, Rania
    Hamon, Catherine
    Chollet, Stephanie
    Vega, German
    Lalanda, Philippe
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2017,
  • [28] Profile Based Access Control Model in Cloud Computing Environment
    Namasudra, Suyel
    Nath, Samir
    Majumder, Abhishek
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [29] Towards the realisation of context-risk-aware access control in pervasive computing
    Ali Ahmed
    Ning Zhang
    [J]. Telecommunication Systems, 2010, 45 : 127 - 137
  • [30] A Context-Aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 425 - +