A Semantic-Aware Role-Based Access Control Model for Pervasive Computing Environments

被引:0
|
作者
Javadi, Seyyed Ahmad [1 ]
Amini, Morteza [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, DNSL, Tehran, Iran
来源
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 2013年 / 5卷 / 02期
关键词
Access Control; Non-Monotonic Logic; Pervasive Computing Environment; Context-Aware;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs not only should be context-aware, but also must be able to deal with imperfect context information. In addition, due to the diversity and heterogeneity of resources and users and their security requirements in PCEs, supporting exception and default policies is a necessary requirement. In this paper, we propose a Semantic-Aware Role-Based Access Control (SARBAC) model satisfying the aforementioned requirements using MKNF+. The main contribution of our work is defining an ontology for context information along with using MKNF+ rules to define context-aware role activation and permission assignment policies. Dividing role activation and permission assignment policies into three layers and using abstract and concrete predicates not only make security policy specification more flexible and manageable, but also make definition of exception and default polices possible. The expressive power of the proposed model is demonstrated through a case study in this paper. (C) 2013 ISC. All rights reserved.
引用
收藏
页码:119 / 140
页数:22
相关论文
共 50 条
  • [41] Privacy Aware Access Control for Data Sharing in Cloud Computing Environments
    Takabi, Hassan
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 27 - 34
  • [42] Role-based access control using neural network
    Chae, SH
    Kim, W
    Kim, DK
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 36 - 40
  • [43] Delta Analysis of Role-Based Access Control Models
    Leitner, Maria
    COMPUTER AIDED SYSTEMS THEORY, PT 1, 2013, 8111 : 507 - 514
  • [44] Extending Role-based Access Control for Business Usage
    Klarl, Heiko
    Molitorisz, Korbinian
    Emig, Christian
    Klinger, Karsten
    Abeck, Sebastian
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 136 - +
  • [45] An extended role-based access control for Web services
    Zhu, Yi-qun
    Li, Jian-hua
    Zhang, Quan-hai
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 471 - +
  • [46] APPLICATION OF ROLE-BASED ACCESS CONTROL IN INFORMATION SYSTEM
    Zhu, Rui-Feng
    Ning, Jie
    Yu, Pei
    2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 426 - 428
  • [47] Distributed Role-based Access Control for Coaliagion Application
    HONG Fan ZHU Xian XING GuanglinHONG Fan
    Geo-Spatial Information Science, 2005, (02) : 138 - 143
  • [48] Enhanced Role-Based Access Control for Cloud Security
    Balamurugan, B.
    Krishna, P. Venkata
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 837 - 852
  • [49] Role-based access control for vehicular adhoc networks
    Kalinin, Maxim
    Krundyshev, Vasiliy
    Rezedinova, Evgenia
    Zegzhda, Peter
    2018 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2018, : 66 - 70
  • [50] Putting role-based discretionary access control into practice
    Zhang, KJ
    Jin, W
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2691 - 2696