CA-UCON: a Context-Aware Usage Control Model

被引:0
|
作者
Almutairi, Abulgader [1 ]
Siewe, Francois [1 ]
机构
[1] De Montfort Univ, Software Technol Res Lab, Leicester LE1 9BH, Leics, England
关键词
Pervasive computing; context-aware; usage control; adaptive system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Usage CONtrol (UCON) model is the latest major enhancement of the traditional access control models which enables mutability of subject and object attributes, and continuity of control on usage of resources. In UCON, access permission decision is based on three factors: authorisations, obligations and conditions. While authorisations and obligations are requirements that must be fulfilled by the subject and the object, conditions are subject and object independent requirements that must be satisfied by the environment. As a consequence, access permission may be revoked (and the access stopped) as a result of changes in the environment regardless of whether the authorisations and obligations requirements are met. This constitutes a major shortcoming of the UCON model in pervasive computing systems which constantly strive to adapt to environmental changes so as to minimise disruptions to the user. To overcome this limitation, this paper proposes a Context-Aware Usage CONtrol (CA-UCON) model which extends the traditional UCON model to enable adaptation to environmental changes in the aim of preserving continuity of access. When the authorisations and obligations requirements are met by the subject and the object, and the conditions requirements fail due to changes in the environment or the system context, CA-UCON model triggers specific actions to adapt to the new situation. Besides the data protection, CA-UCON model so enhances the quality of services, striving to keep explicit interactions with the user at a minimum.
引用
收藏
页码:38 / 43
页数:6
相关论文
共 50 条
  • [21] Context-Aware SmartSpace: Reference Model
    Smirnov, Alexander
    Kashevnik, Alexey
    Shilov, Nikolay
    Boldyrev, Sergey
    Balandin, Sergey
    Oliver, Ian
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 261 - +
  • [22] A Context-aware supplier selection model
    Razzazi, Mohammadreza
    Bayat, Maryam
    [J]. World Academy of Science, Engineering and Technology, 2009, 38 : 736 - 742
  • [23] A Context-Aware Model for Smart Space
    Tian, Xianhu
    Xie, Yong
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 845 - 850
  • [24] A transaction model for context-aware applications
    Chen, Shaxun
    Ge, Jidong
    Tao, Xianping
    Lu, Jian
    [J]. ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2007, 4459 : 252 - +
  • [25] Context-aware Authorization Model for Smartphones
    Miraoui, Moeiz
    [J]. 2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, : 1053 - 1057
  • [26] Learning sensors usage patterns in mobile context-aware systems
    Bobek, Szymon
    Porzycki, Krzysztof
    Nalepa, Grzegorz J.
    [J]. 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 993 - 998
  • [27] Context-Aware Usage-Based Grid Authorization Framework
    CUI Yongquan
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1736 - 1740
  • [28] A Study on Automated Context-aware Access Control Model Using Ontology
    Jang, Bokman
    Jang, Hyokyung
    Choi, Euiin
    [J]. ADVANCED COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2010, 74 : 179 - 186
  • [29] A Policy Model and Framework for Context-Aware Access Control to Information Resources
    Kayes, A. S. M.
    Han, Jun
    Rahayu, Wenny
    Dillon, Tharam
    Islam, Md. Saiful
    Colman, Alan
    [J]. COMPUTER JOURNAL, 2019, 62 (05): : 670 - 705
  • [30] A Context-Aware Mandatory Access Control Model for Multilevel Security Environments
    Jafarian, Jafar Haadi
    Amini, Morteza
    Jalili, Rasool
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2008, 5219 : 401 - 414