CAISMS: A context-aware integrated security management system for smart home

被引:2
作者
Cho, Joon-Sic [1 ]
Park, Seon-Ho [1 ]
Han, Young-Ju [1 ]
Chung, Tai-Myoung [2 ]
机构
[1] Sungkyunkwan Univ, Dept Comp Engn, 300 Cheoncheon Dong, Suwon 440746, Gyeonggi Do, South Korea
[2] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon 440746, South Korea
来源
9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3 | 2007年
关键词
ubiquitous computing; smart home; security; access control; authentication method; context-awareness; CASA; Gaia project;
D O I
10.1109/ICACT.2007.358411
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Computer system is evolving rapidly to ubiquitous computing system. A smart home environment is a typical ubiquitous environment consisting of a network of computerized electronic appliances. Current smart home system provides context information on individual machinery and it responses only to user's passive requirement. Correspondingly, smart home technique does not offer user's authentication access control, and preservation. To emphasize these issues, we study using the environment information by access control method, or user's authentication service requirement. However, current techniques still contains weak points. They cannot establish a large scaled-policy and it cannot also provide various efficient authentication methods. In this research, we propose an integrated preservation system by using the security middleware to solve the problem.
引用
收藏
页码:531 / +
页数:2
相关论文
共 8 条
[1]   Cerberus: A context-aware security scheme for smart spaces [J].
Al-Muhtadi, J ;
Ranganathan, A ;
Campbell, R ;
Mickunas, MD .
PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2003), 2003, :489-496
[2]  
CHEMISHKIAN I, 2002, NETWORKED APPLIANCES, P215
[3]   A context-aware security architecture for emerging applications [J].
Covington, MJ ;
Fogla, P ;
Zhan, ZY ;
Ahamad, M .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :249-258
[4]  
Jiang L, 2004, PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P659
[5]  
Mostéfaoui GK, 2004, IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, P39
[6]   Generalized Role-Based Access Control [J].
Moyer, MJ ;
Ahamad, M .
21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, :391-398
[7]  
PARK S, 2006, HPCC2006
[8]  
Wullems C, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P132