A spatio-temporal access control model supporting delegation for pervasive computing applications

被引:0
作者
Ray, Indrakshi [1 ]
Toahchoodee, Manachai [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
来源
TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS | 2008年 / 5185卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The traditional access control models, such as Role-Based Access Control (RBAC) and Bell-LaPadula (BLP), are not suitable for pervasive computing applications which typically lack well-defined security perimeters and where all the entities and interactions are not known in advance. We propose an access control model that handles such dynamic applications and uses environmental contexts to determine whether a user can get access to some resource. Our model is based on RBAC because it simplifies role management and is the de facto access control model for commercial organizations. However, unlike RBAC, it uses information from the environmental contexts to determine access decisions. The model also supports delegation which is important for dynamic applications where a user is unavailable and permissions may have to be transferred temporarily to another user/role in order to complete a specific task. This model can be used for any application where spatial and temporal information of a user and an object must be taken into account before granting access or temporarily transferring access to another user.
引用
收藏
页码:48 / 58
页数:11
相关论文
共 50 条
  • [21] Pervasive computing context access control based on UCONABC model
    Pu, Fang
    Sun, Daoqin
    Cao, Qiying
    Cai, Haibin
    Yang, Fan
    IIH-MSP: 2006 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2006, : 689 - +
  • [22] Criticality aware access control model for pervasive applications
    Gupta, S. K. S.
    Mukhedee, T.
    Venkatasubramanian, K.
    PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 251 - +
  • [23] Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model
    Toahchoodee, Manachai
    Ray, Indrakshi
    McConnell, Ross M.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2010, 1 (02): : 231 - 250
  • [24] Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model
    Abdunabi, Ramadan
    Al-Lail, Mustafa
    Ray, Indrakshi
    France, Robert B.
    IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 501 - 515
  • [25] A RBAC-Based Multitask Spatio-Temporal Access Control Model MT_RBAC
    Ying, Zhang
    Zhen, Xu
    Chi, Chen
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018), 2018, : 14 - 20
  • [26] A General Motion Model and Spatio-Temporal Filters for Computing Optical Flow
    Hongche Liu
    Tsai-Hong Hong
    Martin Herman
    Rama Chellappa
    International Journal of Computer Vision, 1997, 22 : 141 - 172
  • [27] A general motion model and spatio-temporal filters for computing optical flow
    Liu, HC
    Hong, TH
    Herman, M
    Chellappa, R
    INTERNATIONAL JOURNAL OF COMPUTER VISION, 1997, 22 (02) : 141 - 172
  • [28] Parallel Computing of Spatio-Temporal Model Based on Deep Reinforcement Learning
    Lv, Zhiqiang
    Li, Jianbo
    Xu, Zhihao
    Wang, Yue
    Li, Haoran
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT I, 2021, 12937 : 391 - 403
  • [29] Delay Tolerant Access Control Method Based on Spatio-Temporal Distribution of Access Requests
    Chen L.
    Deng K.
    Jiang T.
    Yue G.
    Li P.
    Yang J.
    Xu X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (05): : 919 - 928
  • [30] Nonlinear Spatio-temporal Wave Computing for Real-time Applications on GPU
    Tukel, Mehmet
    Yeniceri, Ramazan
    Yalcin, Mustak E.
    2012 13TH INTERNATIONAL WORKSHOP ON CELLULAR NANOSCALE NETWORKS AND THEIR APPLICATIONS (CNNA), 2012,