Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments

被引:6
作者
Choi, Jung Hwan [1 ]
Kang, Dong Hyun [1 ]
Jang, Hyunsu [1 ]
Eom, Young Ik [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Seoul, South Korea
来源
2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008) | 2008年
关键词
D O I
10.1109/PCCC.2008.4745089
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In pervasive computing environments, where various types of information are publicly owned, and multiple users access the networks via various networked devices anytime and anywhere, access control that grants permission to an authorized user is definitely needed for secure information access. Context awareness refers to the idea that computers can both sense and react based on various context in their environments. In many access control schemes, recently, context awareness has been utilized to guarantee dynamic access control according to current context and various access control schemes utilizing context awareness have been proposed. However, previous studies have difficulty describing conditions for assigning roles and modifying permissions. They also simply consider assigning roles or modifying permissions, rather than providing detailed access control algorithms such as role delegation or role revocation. In this paper, we propose an adaptive access control scheme utilizing context awareness in pervasive computing environments. We design an adaptive access control model based on traditional RBAC(Role-based Access Control) model, and present an adaptive access control scheme to guarantee dynamic user and permission assignment according to changes of context. In this scheme, we define context requirements in each table, enabling a more detailed description. We also guarantee dynamic access control via various access control algorithms.
引用
收藏
页码:491 / 498
页数:8
相关论文
共 12 条
  • [1] COVINGTON MJ, 2001, SACMAT 01, P10
  • [2] Feng X, 2004, LECT NOTES COMPUT SC, V3252, P430
  • [3] Ferraiolo David, 2003, ARTECH H COMP SEC LI
  • [4] GUSTAF N, 2003, P 8 ACM S ACC CONTR, P65
  • [5] Kim KI, 2007, LECT NOTES COMPUT SC, V4443, P1075
  • [6] Kim YG, 2005, LECT NOTES COMPUT SC, V3528, P236
  • [7] Kulkarni D, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P113
  • [8] Role based access control models
    Sandhu, RS
    Coyne, EJ
    Feinstein, HL
    Youman, CE
    [J]. COMPUTER, 1996, 29 (02) : 38 - &
  • [9] TANG X, 2003, P 2 INT WORKSH GRID, P702
  • [10] Tripathi A, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P159