CA-UCON: a Context-Aware Usage Control Model

被引:0
作者
Almutairi, Abulgader [1 ]
Siewe, Francois [1 ]
机构
[1] De Montfort Univ, Software Technol Res Lab, Leicester LE1 9BH, Leics, England
来源
5TH ACM INTERNATIONAL WORKSHOP ON CONTEXT-AWARENESS FOR SELF-MANAGING SYSTEMS (CASEMANS 2011) | 2011年
关键词
Pervasive computing; context-aware; usage control; adaptive system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Usage CONtrol (UCON) model is the latest major enhancement of the traditional access control models which enables mutability of subject and object attributes, and continuity of control on usage of resources. In UCON, access permission decision is based on three factors: authorisations, obligations and conditions. While authorisations and obligations are requirements that must be fulfilled by the subject and the object, conditions are subject and object independent requirements that must be satisfied by the environment. As a consequence, access permission may be revoked (and the access stopped) as a result of changes in the environment regardless of whether the authorisations and obligations requirements are met. This constitutes a major shortcoming of the UCON model in pervasive computing systems which constantly strive to adapt to environmental changes so as to minimise disruptions to the user. To overcome this limitation, this paper proposes a Context-Aware Usage CONtrol (CA-UCON) model which extends the traditional UCON model to enable adaptation to environmental changes in the aim of preserving continuity of access. When the authorisations and obligations requirements are met by the subject and the object, and the conditions requirements fail due to changes in the environment or the system context, CA-UCON model triggers specific actions to adapt to the new situation. Besides the data protection, CA-UCON model so enhances the quality of services, striving to keep explicit interactions with the user at a minimum.
引用
收藏
页码:38 / 43
页数:6
相关论文
共 8 条
  • [1] Choi H. J. Jung Hwan, 2008, PERF COMP COMM C 200
  • [2] Emami S. Z. Sareh Sadat, 2007, 2007 INT C INT PERV
  • [3] Filho H. M. Jose Bringel, 2009, P 2 SIGSPATIAL ACM G
  • [4] Haibo H. F. SHEN, 2005, P 2005 IEEE INT C E
  • [5] Kapsalisa D. K. S. K. Vassilis, 2006, COMPUT SECUR, V25, P507
  • [6] Park J., 2004, ACM Transactions on Information and Systems Security, V7, P128, DOI 10.1145/984334.984339
  • [7] Wang L.-C. F. Chun-Dong, 2008, 2008 INT C MULT UB E
  • [8] Zhu R. X. Zhou, 2008, WIR COMM NETW MOB CO