The Application of the Context-Aware Access Control Model

被引:0
作者
Zhang, Chao [1 ]
Jin, Zhengping [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
来源
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015) | 2015年 / 39卷
关键词
access control; context-aware; RFID; monitoring system;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Traditional access control model in building safety regulation is not flexible enough in some scenarios, especially in emergency events, which may lead to the alarm events not promptly treated. In order to solve this problem, we design a context-aware access control model which uses RFID technology to identify the user's identity information and the environmental contexts, then we apply it to the intelligent building monitoring system. The application of the new model can bring more flexibility and security.
引用
收藏
页码:2670 / 2674
页数:5
相关论文
共 50 条
[41]   Context-Aware Mobile Business Model Discovery [J].
Al-Qirim, Nabeel .
ANT 2012 AND MOBIWIS 2012, 2012, 10 :1180-1187
[42]   Context-Aware Mobile Learning Model for Traveler [J].
Sahid, Dadang Syarif Sihabudin ;
Nugroho, Lukito Edi ;
Ferdiana, Ridi ;
Santosa, Paulus Insap .
ADVANCED SCIENCE LETTERS, 2015, 21 (10) :3069-3073
[43]   Fuzzy Privacy Decision for Context-Aware Access Personal Information [J].
ZHANG QingshengQI YongZHAO JizhongHOU DiNIU Yujie School of Electronic and Information EngineeringXian Jiaotong UniversityXian ShaanxiChina .
WuhanUniversityJournalofNaturalSciences, 2007, (05) :941-945
[44]   Investigation into a universal context model to support context-aware applications [J].
Pascoe, Jason ;
Rodrigues, Helena ;
Ariza, Cesar .
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 2, PROCEEDINGS, 2006, 4278 :1884-+
[45]   Learning Context-aware Latent Representations for Context-aware Collaborative Filtering [J].
Liu, Xin ;
Wu, Wei .
SIGIR 2015: PROCEEDINGS OF THE 38TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2015, :887-890
[46]   Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control [J].
Kayes, A. S. M. ;
Rahayu, Wenny ;
Watters, Paul ;
Alazab, Mamoun ;
Dillon, Tharam ;
Chang, Elizabeth .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 :307-323
[47]   BIG-ABAC: Leveraging Big Data for Adaptive, Scalable, and Context-Aware Access Control [J].
Baccouri, Sondes ;
Abdellatif, Takoua .
CMES - Computer Modeling in Engineering and Sciences, 2025, 143 (01) :1071-1093
[48]   BIG-ABAC: Leveraging Big Data for Adaptive, Scalable, and Context-Aware Access Control [J].
Baccouri, Sondes ;
Abdellatif, Takoua .
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2025, 143 (01) :1071-1093
[49]   Domain of Application in Context-Aware Recommender Systems: A Review [J].
Haruna, Khalid ;
Ismail, Maizatul Akmar ;
Shuhidan, Shuhaida Mohamed .
PROCEEDINGS OF KNOWLEDGE MANAGEMENT INTERNATIONAL CONFERENCE (KMICE) 2016, 2016, :223-228
[50]   Intelligent Configuration Recommendation of Context-aware Mobile Application [J].
Xie Haitao ;
Meng Xiangwu .
2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, :1263-1268