An Ontology-Based Approach to Context-Aware Access Control for Software Services

被引:0
作者
Kayes, A. S. M. [1 ]
Han, Jun [1 ]
Colman, Alan [1 ]
机构
[1] Swinburne Univ Technol, Fac Informat & Commun Technol, Hawthorn, Vic 3122, Australia
来源
WEB INFORMATION SYSTEMS ENGINEERING - WISE 2013, PT I | 2013年 / 8180卷
关键词
Context-Awareness; Context-Aware Access Control; Context Model; High-Level Context; Access Control Policy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In modern communication environments, the ability to provide access control to services in a context-aware manner is crucial. By leveraging the dynamically changing context information, we can achieve context-specific control over access to services, better satisfying the security and privacy requirements of the stakeholders. In this paper, we introduce a new Context-Aware Access Control (CAAC) Framework that adopts an ontological approach in modelling dynamic context information and the corresponding CAAC policies. It includes a context model specific to access control, capturing the relevant low-level context information and inferring the high-level implicit context information. Using the context model, the policy model of the framework provides support for specifying and enforcing CAAC policies. We have developed a prototype and presented a healthcare case study to realise the framework.
引用
收藏
页码:410 / 420
页数:11
相关论文
共 12 条
  • [1] Chandran SM, 2005, LECT NOTES COMPUT SC, V3806, P361
  • [2] Context-based access control management in ubiquitous environments
    Corradi, A
    Montanari, R
    Tibaldi, D
    [J]. THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 253 - 260
  • [3] Context-Aware Access Control for RDF Graph Stores
    Costabello, Luca
    Villata, Serena
    Gandon, Fabien
    [J]. 20TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (ECAI 2012), 2012, 242 : 282 - 287
  • [4] Understanding and Using Context
    Dey, Anind K.
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2001, 5 (01) : 4 - 7
  • [5] Semantics-based Access Control Approach for Web Service
    He, Zhengqiu
    Wu, Lifa
    Li, Huabo
    Lai, Haiguang
    Hong, Zheng
    [J]. JOURNAL OF COMPUTERS, 2011, 6 (06) : 1152 - 1161
  • [6] Hulsebosch R.J., 2005, Proceedings of the 10th ACM symposium on Access Control Models and Technologies, SACMAT '05, P111, DOI DOI 10.1145/1063979.1064000
  • [7] Kayes A. S. M., 2012, Information Security and Privacy. Proceedings 17th Australasian Conference, ACISP 2012, P442, DOI 10.1007/978-3-642-31448-3_34
  • [8] Kulkarni D, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P113
  • [9] OWL 2 modeling and reasoning with complex human activities
    Riboni, Daniele
    Bettini, Claudio
    [J]. PERVASIVE AND MOBILE COMPUTING, 2011, 7 (03) : 379 - 395
  • [10] Role based access control models
    Sandhu, RS
    Coyne, EJ
    Feinstein, HL
    Youman, CE
    [J]. COMPUTER, 1996, 29 (02) : 38 - &