Towards the realisation of context-risk-aware access control in pervasive computing

被引:0
|
作者
Ali Ahmed
Ning Zhang
机构
[1] University of Manchester,School of Computer Science
来源
Telecommunication Systems | 2010年 / 45卷
关键词
Access Control; Ubiquitous Computing; Context-aware; Level of assurance; Risk assessment; Context-Risk-Aware Access Control;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes a novel Context-Risk-Aware Access Control (CRAAC) model for Ubiquitous Computing (UbiComp) environments. Context-aware access control allows access permissions to be adjusted dynamically in adaptation to the changes in the surrounding context. Though current context-aware access control solutions can, to a certain extent, achieve such context adaptation, there are still limitations in these solutions. One of the limitations is that they make use of an architectural model by which the two major functional blocks, context infrastructure and access control system, are tightly coupled together. As a result, they are not flexible nor generic to accommodate various access control constraints and policy settings. The CRAAC model is designed to overcome this limitation. By introducing the concept of risk aware and authorisation levels of assurance (LoA) into the authorisation decision making, and by maximising the use of a component-based approach in the architectural design, the model has successfully decoupled context infrastructure and access control system making it more extensible in providing the required functionality, and more flexible in accommodating different contextual attributes and their mutual correlation. In addition, it interoperates and is backward compatible with traditional role-based access control solutions.
引用
收藏
页码:127 / 137
页数:10
相关论文
共 50 条
  • [1] Towards the realisation of context-risk-aware access control in pervasive computing
    Ahmed, Ali
    Zhang, Ning
    [J]. TELECOMMUNICATION SYSTEMS, 2010, 45 (2-3) : 127 - 137
  • [2] A Context-Risk-Aware Access Control Model for Ubiquitous Environments
    Ahmed, Ali
    Zhang, Ning
    [J]. 2008 INTERNATIONAL MULTICONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (IMCSIT), VOLS 1 AND 2, 2008, : 720 - 727
  • [3] A context-aware access control model for pervasive computing environments
    Emami, Sareh Sadat
    Amini, Morteza
    Zokaei, Saadan
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 51 - +
  • [4] A Context-Aware Access Control Model for Pervasive Computing in Enterprise Environments
    Zhu, Zhou
    Xu, Renzuo
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4572 - 4577
  • [5] Context-Aware Role-based Access Control in Pervasive Computing Systems
    Kulkarni, Devdatta
    Tripathi, Anand
    [J]. SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 113 - 122
  • [6] Distributed, uncertainty-aware access control for pervasive computing
    Hengartner, Urs
    Zhong, Ge
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 241 - +
  • [7] Context-aware pervasive computing
    Abowd, GD
    Ebling, MR
    Gellersen, HW
    Hunt, G
    Lei, H
    [J]. IEEE WIRELESS COMMUNICATIONS, 2002, 9 (05): : 8 - 9
  • [8] A semantic context-aware access control in pervasive environments
    Ko, Hyuk Jin
    Won, Dong Ho
    Shin, Dong Ryul
    Choo, Hyun Seung
    Kim, Ung Mo
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2, 2006, 3981 : 165 - 174
  • [9] A Context-Aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 425 - +
  • [10] A Context-aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. IETE TECHNICAL REVIEW, 2010, 27 (05) : 371 - 379