Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Environments

被引:1
作者
Sharghi, Hassan [1 ]
Liscano, Ramiro [1 ]
机构
[1] Univ Ontario, Inst Technol, Dept Elect Comp & Software Engn, Oshawa, ON L1H 7K4, Canada
来源
E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017 | 2017年 / 289卷
关键词
Access control; Obligation; Behavior; Session initiation protocol; Pervasive computing; CONTROL MODEL;
D O I
10.1007/978-3-319-59041-7_2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The widely use of advanced technologies in the sensor network and computing has facilitated the development of convenient pervasive applications in order to access information at anytime and anywhere. The traditional access control mechanisms cannot appropriately protect the access and usage of digital resources in the highly distributed and heterogeneous computing environment. In such an environment, enforcing continuously the access control policies during the access period is a challenge because traditional authorization decisions are generally made at the time of access requests but do not consider ongoing controls. Obligations are the vital part of many access control policies and they specify mandatory behavior that should be conducted by a user of the access control system in sensitive domains. Therefore, utilizing a mechanism to approve the fulfillment of the obligation is required for continuing or revoking the access decision. We leveraged the capability of Session Initiation Protocol (SIP) to manage the communication between entities in order to provide a mechanism to handle the continuous enforcement of the obligation. Meanwhile, we present several scenarios which indicate our proposed model can manage the obligatory behavior that affects the continuity of access to resources in pervasive computing environment.
引用
收藏
页码:24 / 40
页数:17
相关论文
共 25 条
[1]  
Ardagna ClaudioA., 2006, Proceedings of the 2006 ACM Symposium on Information, computer and communications security, ASIACCS '06, P212
[2]  
Cirani S., 2015, SCI INT J PARALLEL D, V14, P249
[3]   An Approach to Supporting Continuity of Usage in Location-based Access Control [J].
Damiani, Maria Luisa ;
Bertino, Elisa ;
Silvestri, Claudio .
12TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2008, :199-+
[4]   Formal enforcement and management of obligation policies [J].
Elrakaiby, Yehia ;
Cuppens, Frederic ;
Cuppens-Boulahia, Nora .
DATA & KNOWLEDGE ENGINEERING, 2012, 71 (01) :127-147
[5]  
Feltus C., 2010, Business/IT Alignment and Interoperability BUSITAL 2010, P61
[6]  
Gomez L, 2014, LECT NOTES COMPUT SC, V8842, P108, DOI 10.1007/978-3-662-45550-0_15
[7]  
Karopoulos G., 2012, Proceedings of the 2012 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2012), P283, DOI 10.1109/PDP.2012.81
[8]   Usage control in SIP-based multimedia delivery [J].
Karopoulos, Georgios ;
Mori, Paolo ;
Martinelli, Fabio .
COMPUTERS & SECURITY, 2013, 39 :406-418
[9]  
Katt B, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P123
[10]  
Kulkarni D, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P113