New role-based access control in ubiquitous e-business environment

被引:0
|
作者
Sejong Oh
机构
[1] Dankook University,Department of Computer Science
来源
关键词
IMS; Access control; RBAC; Ubiquitous e-Business; Context awareness;
D O I
暂无
中图分类号
学科分类号
摘要
Ubiquitous e-business is one of major topics in intelligent manufacturing systems. Ubiquitous e-business environment requires security features including access control. Traditional access control models such as access control list (ACL), mandatory access control (MAC), and role-based access control (RBAC) are unsuitable for a ubiquitous e-business environment because they cannot satisfy its requirements. In this study, we propose a new access control model termed the Ubi-RBAC model. It is based on the RBAC model and adds new components such as space, space hierarchy, and context constraints. Ubi-RBAC covers the context awareness and mobility of subjects (human users), which are the key issues of access control in the ubiquitous e-business environment.
引用
收藏
页码:607 / 612
页数:5
相关论文
共 50 条
  • [1] New role-based access control in ubiquitous e-business environment
    Oh, Sejong
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2010, 21 (05) : 607 - 612
  • [2] Role-based access control model for ubiquitous computing environment
    Chae, SH
    Kim, W
    Kim, DK
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 354 - 363
  • [3] Extending Role-based Access Control for Business Usage
    Klarl, Heiko
    Molitorisz, Korbinian
    Emig, Christian
    Klinger, Karsten
    Abeck, Sebastian
    [J]. 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 136 - +
  • [4] uT-RBAC: Ubiquitous role-based access control model
    Chae, SH
    Kim, W
    Kim, DK
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
  • [5] Access Control for e-Business on MOPASS
    Shin, Kilho
    Taguchi, Masahiro
    [J]. IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2005, 1 (01): : 65 - 72
  • [6] Application of Role-Based Access Control for Web Environment
    Robles, Rosslin John
    Choi, Min-Kyu
    Yeo, Sang-Soo
    Kim, Tai-hoon
    [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 171 - +
  • [7] Role-based access control
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [8] Role-Based Access Control Models in E-Government
    Yu, Zheng
    [J]. FUZZY SYSTEMS, KNOWLEDGE DISCOVERY AND NATURAL COMPUTATION SYMPOSIUM (FSKDNC 2013), 2013, : 499 - 506
  • [9] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [10] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    [J]. 2001, Association for Computing Machinery (35):