The Application of the Context-Aware Access Control Model

被引:0
作者
Zhang, Chao [1 ]
Jin, Zhengping [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
来源
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015) | 2015年 / 39卷
关键词
access control; context-aware; RFID; monitoring system;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Traditional access control model in building safety regulation is not flexible enough in some scenarios, especially in emergency events, which may lead to the alarm events not promptly treated. In order to solve this problem, we design a context-aware access control model which uses RFID technology to identify the user's identity information and the environmental contexts, then we apply it to the intelligent building monitoring system. The application of the new model can bring more flexibility and security.
引用
收藏
页码:2670 / 2674
页数:5
相关论文
共 50 条
[21]   Context-Aware Policy Enforcement for PaaS-Enabled Access Control [J].
Verginadis, Yiannis ;
Patiniotakis, Ioannis ;
Gouvas, Panagiotis ;
Mantzouratos, Spyros ;
Veloudis, Simeon ;
Schork, Sebastian Thomas ;
Seitzluwig, Ludwig ;
Paraskakis, Iraklis ;
Mentzas, Gregoris .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) :276-291
[22]   Context-aware privacy-preserving access control for mobile computing [J].
Herrera, Juan Luis ;
Chen, Hsiao-Yuan ;
Berrocal, Javier ;
Murillo, Juan M. ;
Julien, Christine .
PERVASIVE AND MOBILE COMPUTING, 2022, 87
[23]   Context-aware Security Models for PaaS-enabled Access Control [J].
Veloudis, Simeon ;
Verginadis, Yiannis ;
Patiniotakis, Ioannis ;
Paraskakis, Iraklis ;
Mentzas, Gregoris .
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, VOL 2 (CLOSER), 2016, :202-212
[24]   Access point placement for context-aware system [J].
Wang, Chundong ;
Wang, Xiu-Feng ;
Gao, Ming .
DCABES 2006 PROCEEDINGS, VOLS 1 AND 2, 2006, :1295-1297
[25]   Context-Aware Content Adaptation in Access Point [J].
Mohrehkesh, Shahram ;
Nadeem, Tamer ;
Weigle, Michele C. .
UBICOMP'12: PROCEEDINGS OF THE 2012 ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING, 2012, :758-761
[26]   Improving IoT access control with context-aware machine learning: reducing bias and enhancing accuracy [J].
Tyagi, Surendra ;
Prasad, Yamuna ;
Jinwala, Devesh C. ;
Bhattacharjee, Subhasis .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2025, 49 (01) :60-73
[27]   CA-UCON: a Context-Aware Usage Control Model [J].
Almutairi, Abulgader ;
Siewe, Francois .
5TH ACM INTERNATIONAL WORKSHOP ON CONTEXT-AWARENESS FOR SELF-MANAGING SYSTEMS (CASEMANS 2011), 2011, :38-43
[28]   CAACS: Context-Aware Access Control System for Physical Space in Smart Building [J].
Fujiu, Akira ;
Hamada, Takeo ;
Sumitomo, Takahiro ;
Koshizuka, Noboru .
2018 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2018, :49-54
[29]   Context-aware Authorization Model for Smartphones [J].
Miraoui, Moeiz .
2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, :1053-1057
[30]   Context-Aware Recommendation Model based on Mobile Application Analysis Platform [J].
Ahyoung Kim ;
Junwoo Lee ;
Mucheol Kim .
Multimedia Tools and Applications, 2016, 75 :14783-14794