A Semantic-Aware Role-Based Access Control Model for Pervasive Computing Environments

被引:0
|
作者
Javadi, Seyyed Ahmad [1 ]
Amini, Morteza [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, DNSL, Tehran, Iran
关键词
Access Control; Non-Monotonic Logic; Pervasive Computing Environment; Context-Aware;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs not only should be context-aware, but also must be able to deal with imperfect context information. In addition, due to the diversity and heterogeneity of resources and users and their security requirements in PCEs, supporting exception and default policies is a necessary requirement. In this paper, we propose a Semantic-Aware Role-Based Access Control (SARBAC) model satisfying the aforementioned requirements using MKNF+. The main contribution of our work is defining an ontology for context information along with using MKNF+ rules to define context-aware role activation and permission assignment policies. Dividing role activation and permission assignment policies into three layers and using abstract and concrete predicates not only make security policy specification more flexible and manageable, but also make definition of exception and default polices possible. The expressive power of the proposed model is demonstrated through a case study in this paper. (C) 2013 ISC. All rights reserved.
引用
下载
收藏
页码:119 / 140
页数:22
相关论文
共 50 条
  • [1] A semantic-aware ontology-based trust model for pervasive computing environments
    Taherian, Mohsen
    Jalili, Rasool
    Amini, Morteza
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 47 - 59
  • [2] Context-Aware Role-based Access Control in Pervasive Computing Systems
    Kulkarni, Devdatta
    Tripathi, Anand
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 113 - 122
  • [3] A Context-Sensitive Dynamic Role-Based Access Control Model for Pervasive Computing Environments
    Emami, Sareh Sadat
    Zokaei, Saadan
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 2 (01): : 47 - 66
  • [4] A context-aware access control model for pervasive computing environments
    Emami, Sareh Sadat
    Amini, Morteza
    Zokaei, Saadan
    2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 51 - +
  • [5] A context, rule and role-based access control model in enterprise pervasive computing environment
    Huang, Xianzhi
    Wang, Haiyang
    Chen, Zhenxiang
    Lin, Jinjiao
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 497 - +
  • [6] A Context-Aware Access Control Model for Pervasive Computing in Enterprise Environments
    Zhu, Zhou
    Xu, Renzuo
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4572 - 4577
  • [7] A semantic context-aware access control in pervasive environments
    Ko, Hyuk Jin
    Won, Dong Ho
    Shin, Dong Ryul
    Choo, Hyun Seung
    Kim, Ung Mo
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2, 2006, 3981 : 165 - 174
  • [8] A Semantic-Aware Attribute-Based Access Control Model for Web Services
    Shen, Haibo
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2009, 5574 : 693 - 703
  • [9] A semantic context-aware access control framework pp for secure collaborations in pervasive computing environments
    Toninelli, Alessandra
    Montanari, Rebecca
    Kagal, Lalana
    Lassila, Ora
    Semantic Web - ISEC 2006, Proceedings, 2006, 4273 : 473 - 486
  • [10] Role-based access control model for ubiquitous computing environment
    Chae, SH
    Kim, W
    Kim, DK
    INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 354 - 363