A context-based and associated access control model in pervasive computing environment

被引:0
|
作者
Li, Ying [1 ]
Tong, Weiqin [1 ]
Zhi, Xiaoli [1 ]
机构
[1] Shanghai Univ, Sch Engn & Comp Sci, Shanghai, Peoples R China
关键词
pervasive computing; context; access control; CAAC model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the features of access control in pervasive computing environment are summarized and the limitations of previous models are discussed. Then, a context- based and associated access control model is proposed, which integrates the principles of TBAC and RBAC and uses the environment context as a factor to reason role assigning and authority granting. The proposed model shows effectiveness in simplifying the procedures of access control and ensuring security. It also improves the flexibility and intelligence of access control, and those are the prerequisite of the transparency service. The structure of the proposed model and related definitions are described in this paper. Finally the design and implementation of the prototype system based on the model are also put forward.
引用
收藏
页码:143 / 146
页数:4
相关论文
共 50 条
  • [31] Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments
    Choi, Jung Hwan
    Kang, Dong Hyun
    Jang, Hyunsu
    Eom, Young Ik
    [J]. 2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 491 - 498
  • [32] A Context-aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. IETE TECHNICAL REVIEW, 2010, 27 (05) : 371 - 379
  • [33] Towards the realisation of context-risk-aware access control in pervasive computing
    Ahmed, Ali
    Zhang, Ning
    [J]. TELECOMMUNICATION SYSTEMS, 2010, 45 (2-3) : 127 - 137
  • [34] Context-Based Decision Making Method for Physiological Signal Analysis in a Pervasive Sensing Environment
    Choi, Ahyoung
    Woo, Woontack
    [J]. CUTTING-EDGE RESEARCH TOPICS ON MULTIPLE CRITERIA DECISION MAKING, PROCEEDINGS, 2009, 35 : 325 - 332
  • [35] CSMD: A context-based scheme for multimedia delivery in ubiquitous computing environment
    Zhang, WZ
    Li, ML
    Zhang, CQ
    [J]. ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 565 - 569
  • [36] Distributed Trust Based Access Control Architecture for Pervasive Computing
    Javeed, M. Younas
    Nawaz, Sidra
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 464 - 469
  • [37] Dynamic role and context-based access control for grid applications
    Yao, HB
    Hu, HP
    Huang, BH
    Li, RX
    [J]. PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 404 - 406
  • [38] Context-Based, Predictive Access Control to Electronic Health Records
    Psarra, Evgenia
    Apostolou, Dimitris
    Verginadis, Yiannis
    Patiniotakis, Ioannis
    Mentzas, Gregoris
    [J]. ELECTRONICS, 2022, 11 (19)
  • [39] Exploring a Context-based Network Access Control for Mobile Devices
    Mowafi, Yaser
    Abou-Tair, Dhiah el Diehn I.
    Zmily, Ahmad
    Al-Aqarbeh, Tareq
    Abilov, Marat
    Dmitriyevr, Viktor
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND SOFTWARE ENGINEERING (SCSE'15), 2015, 62 : 547 - 554
  • [40] Context-Based Access Control to Medical Data in Smart Homes
    Guennoun, Mouhcine
    Talon, Jonas
    Weddum, Catherine
    El-Khatib, Khalil
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 298 - 302