Applied Technology for Usage Control model in Pervasive Computing

被引:0
|
作者
Liu, Fei [1 ]
机构
[1] Logist Univ Chinese Armed Police Force, Dept Mil Transportat, Tianjin 300309, Peoples R China
关键词
Pervasive Computing; Access Control; Usage Control;
D O I
10.4028/www.scientific.net/AMR.886.605
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
During the applications development of pervasive computing, access control is new demands advanced by pervasive computing. Usage Control models are used to solve access control. This paper uses these models to solve problem of access control in Pervasive Computing environment and provides a model of Usage Control in Pervasive Computing (UCONpc), context information and delegation rights satisfy the features of access control in pervasive computing system.
引用
收藏
页码:605 / 608
页数:4
相关论文
共 50 条
  • [1] Research on Usage Control Model in Pervasive Computing System
    Wu, Haiying
    [J]. ADVANCES IN ELECTRONIC COMMERCE, WEB APPLICATION AND COMMUNICATION, VOL 2, 2012, 149 : 603 - 608
  • [2] Pervasive computing: Mapping TangO model onto Jini technology
    Hallenborg, K
    Kristensen, BB
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XI, PROCEEDINGS: COMPUTER SCIENCE II, 2002, : 205 - 212
  • [3] Pervasive model, a new paradigm of computing applied to road transport systems
    Garcia, C.
    Alayon, F.
    Caraballo, J.
    Perez, R.
    Padron, G.
    [J]. URBAN TRANSPORT XII: URBAN TRANSPORT AND THE ENVIRONMENT IN THE 21ST CENTURY, 2006, 89 : 257 - 266
  • [4] Multimedia technology for pervasive computing environment
    Park, Jong Hyuk
    Yu, Zhiwen
    Zhou, Liang
    [J]. JOURNAL OF SUPERCOMPUTING, 2013, 65 (01): : 258 - 261
  • [5] Research on Pervasive Simulation Based on Grid and Pervasive Computing Technology
    Li, Ni
    Xiao, Zhen
    Xu, Lijuan
    Peng, Xiaoyuan
    [J]. 7TH INTERNATIONAL CONFERENCE ON SYSTEM SIMULATION AND SCIENTIFIC COMPUTING ASIA SIMULATION CONFERENCE 2008, VOLS 1-3, 2008, : 211 - 217
  • [6] Enforcing trust in pervasive computing with trusted computing technology
    Li, Shiqun
    Balfe, Shane
    Zhou, Jianying
    Chen, Kefei
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
  • [7] The adaptive technology of pervasive computing terminals
    Li, Y
    Luo, L
    Xiong, GZ
    [J]. PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 116 - 121
  • [8] Multimedia technology for pervasive computing environment
    Jong Hyuk Park
    Zhiwen Yu
    Liang Zhou
    [J]. The Journal of Supercomputing, 2013, 65 : 258 - 261
  • [9] Technology of network management for pervasive computing
    Qu, Ming
    Liu, Shufen
    Bao, Tie
    Han, Lu
    [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 122 - +
  • [10] Pervasive computing context access control based on UCONABC model
    Pu, Fang
    Sun, Daoqin
    Cao, Qiying
    Cai, Haibin
    Yang, Fan
    [J]. IIH-MSP: 2006 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2006, : 689 - +