Role-Based Access Control Models
Computer
TRBAC: a temporal role-based access control model
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Understanding and Using Context
Personal and Ubiquitous Computing
A Survey of Context-Aware Mobile Computing Research
A Survey of Context-Aware Mobile Computing Research
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
AICT-SAPIR-ELETE '05 Proceedings of the Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop
An Anonymous Context Aware Access Control Architecture For Ubiquitous Services
MDM '06 Proceedings of the 7th International Conference on Mobile Data Management
A Quality Measurement Method of Context Information in Ubiquitous Environments
ICHIT '06 Proceedings of the 2006 International Conference on Hybrid Information Technology - Volume 02
Context-Dependent Access Control for Contextual Information
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Middleware Support for Quality of Context in Pervasive Context-Aware Systems
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
A Context Quality Model for Ubiquitous Applications
NPC '07 Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
Context-Aware Computing Applications
WMCSA '94 Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications
A spatio-temporal role-based access control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
PhotoMap - automatic spatiotemporal annotation for mobile photos
W2GIS'07 Proceedings of the 7th international conference on Web and wireless geographical information systems
A semantic approach and a web tool for contextual annotation of photos using camera phones
WISE'07 Proceedings of the 8th international conference on Web information systems engineering
Context-Role based access control for context-aware application
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
LoT-RBAC: a location and time-based RBAC model
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
Context-Aware access control mechanism for ubiquitous applications
AWIC'05 Proceedings of the Third international conference on Advances in Web Intelligence
TrustAC: trust-based access control for pervasive devices
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A generalized context-based access control model for pervasive environments
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Towards the semantic and context-aware management of mobile multimedia
Multimedia Tools and Applications
Hi-index | 0.00 |
In Pervasive Computing Environments (PCE), context information can have a strong impact on application adaptation; not only at application logic level but also security management level. Therefore, from an access control point of view, it is required that the access control models take into account context information such as location and time, in determining whether access should be allowed or not. As context information represents real-world situations, it is associated with certain quality indicators that can influence directly the access control decisions. In this paper, we propose an owner-centric QoC-Aware Context-Based Access Control model (QACBAC) that takes into account both context information and its QoC indicators to grant and to adapt access permissions to resources. We also introduce components and equations to measure the revelant QoC indicators to the access control services/users, that will be used in the QACBAC model. Moreover, a case study is presents showing the definition of access rules using the proposed access control model.