A semantic context-aware access control framework pp for secure collaborations in pervasive computing environments

被引:0
|
作者
Toninelli, Alessandra
Montanari, Rebecca
Kagal, Lalana
Lassila, Ora
机构
[1] Univ Bologna, Dipartimento Elettron Informat & Sistemist, I-40136 Bologna, Italy
[2] MIT, CSAIL, Cambridge, MA 02139 USA
[3] Nokia Res Ctr, Cambridge Ctr 3, Cambridge, MA 02142 USA
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless connectivity and widespread diffusion of portable devices offer novel opportunities for users to share resources anywhere and anytime, and to form ad-hoc coalitions. Resource access control is crucial to leverage these ad-hoc collaborations. In pervasive scenarios, however, collaborating entities cannot be predetermined and resource availability frequently varies, even unpredictably, due to user/device mobility, thus complicating resource access control. Access control policies cannot be defined based on entity's identities/roles, as in traditional access control solutions, or be specified a priori to face any operative run time condition, but require continuous adjustments to adapt to the current situation. To address these issues, this paper advocates the adoption of novel access control policy models that follow two main design guidelines: context-awareness to control resource access on the basis of context visibility and to enable dynamic adaptation of policies depending on context changes, and semantic technologies for context/policy specification to allow high-level description and reasoning about context and policies. The paper also describes the design of a semantic context-aware policy model that adopts ontologies and rules to express context and context-aware access control policies and supports policy adaptation.
引用
收藏
页码:473 / 486
页数:14
相关论文
共 50 条
  • [1] A semantic context-aware access control in pervasive environments
    Ko, Hyuk Jin
    Won, Dong Ho
    Shin, Dong Ryul
    Choo, Hyun Seung
    Kim, Ung Mo
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2, 2006, 3981 : 165 - 174
  • [2] A context-aware access control model for pervasive computing environments
    Emami, Sareh Sadat
    Amini, Morteza
    Zokaei, Saadan
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 51 - +
  • [3] A Context-Aware Access Control Model for Pervasive Computing in Enterprise Environments
    Zhu, Zhou
    Xu, Renzuo
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4572 - 4577
  • [4] A Context-Aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 425 - +
  • [5] A Context-aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. IETE TECHNICAL REVIEW, 2010, 27 (05) : 371 - 379
  • [6] A context-aware framework to enable adaptation in pervasive computing environments
    Malatras, Apostolos
    Hirsbrunner, Beat
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 182 - 187
  • [7] A Quality of Context-Aware Approach to Access Control in Pervasive Environments
    Toninelli, Alessandra
    Corradi, Antonio
    Montanari, Rebecca
    [J]. MOBILE WIRELESS MIDDLEWARE, OPERATING SYSTEMS, AND APPLICATIONS, 2009, 7 : 236 - 251
  • [8] An ontology for context-aware pervasive computing environments
    Chen, H
    Finin, T
    Joshi, A
    [J]. KNOWLEDGE ENGINEERING REVIEW, 2003, 18 (03): : 197 - 207
  • [9] Context-aware regulation of context-aware mobile services in pervasive computing environments
    Syukur, Evi
    Loke, Seng Wai
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 138 - 147
  • [10] Context-aware service composition in pervasive computing environments
    Ben Mokhtar, Sonia
    Fournier, Damien
    Georgantas, Nikolaos
    Issarny, Valerie
    [J]. RAPID INTEGRATION OF SOFTWARE ENGINEERING TECHNIQUES, 2006, 3943 : 129 - 144