A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Communications of the ACM
Controlled access and dissemination of XML documents
Proceedings of the 2nd international workshop on Web information and data management
Fine grained access control for SOAP E-services
Proceedings of the 10th international conference on World Wide Web
Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
An authorization model for temporal XML documents
Proceedings of the 2002 ACM symposium on Applied computing
Computer
Building the ubiquitous computing user experience
CHI '01 Extended Abstracts on Human Factors in Computing Systems
Migration control for mobile agents based on passport and visa
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
Access Control for Active Spaces
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
ADC '03 Proceedings of the 14th Australasian database conference - Volume 17
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Security Architecture in Gaia
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
Concept-level access control for the Semantic Web
Proceedings of the 2003 ACM workshop on XML security
Active security management based on secure zone cooperation
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
Role-based access control in ambient and remote space
Proceedings of the ninth ACM symposium on Access control models and technologies
A Flexible Payment Scheme and Its Role-Based Access Control
IEEE Transactions on Knowledge and Data Engineering
Ubiquitous computing environments and its usage access control
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
A framework for role-based group deligation in distributed environments
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
A framework model for grid security
Future Generation Computer Systems
Future Generation Computer Systems
Achieving secure and flexible M-services through tickets
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
A Kerberos security architecture for web services based instrumentation grids
Future Generation Computer Systems
Security and privacy on low-cost Radio Frequency Identification systems
International Journal of Security and Networks
Editorial: Special Section: Future Generation Information Technology
Future Generation Computer Systems
Future Generation Computer Systems
A purpose-based access control in native XML databases
Concurrency and Computation: Practice & Experience
Secure cooperative access control on grid
Future Generation Computer Systems
Editorial: Recent developments in high performance computing and security: An editorial
Future Generation Computer Systems
A Roadmap to the Introduction of Pervasive Information Systems in Healthcare
International Journal of Advanced Pervasive and Ubiquitous Computing
Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography
Computer Standards & Interfaces
Hi-index | 0.00 |
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. This ubiquitous computing poses new security challenges while the information can be accessed at anywhere and anytime because it may be applied by criminal users. Additionally, the information may contain private information that cannot be shared by all user communities. Several approaches are developed to protect information for pervasive environments against malicious users. However, ad hoc mechanisms or protocols are typically added in the approaches by compromising disorganized policies or additional components to protect from unauthorized access. In this paper, we present a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents. The model not only supports complex constraints for pervasive computing, such as services, devices and data types but also provides a mechanism to build rich reuse relationships between models and objects. Finally, comparisons with related works are analysed.