Role-Based Access Control Models
Computer
A Middleware Infrastructure for Active Spaces
IEEE Pervasive Computing
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
XML access control using static analysis
Proceedings of the 10th ACM conference on Computer and communications security
Context-Based Access Control for Ubiquitous Service Provisioning
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A contextual role-based access control authorization model for electronic patient record
IEEE Transactions on Information Technology in Biomedicine
Hi-index | 0.00 |
Pervasive environment is a post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday object and activities. In there environment access control is a critical issue, with many aspects relating to the establishment, authorization and enforcement of policies that protect the resources from adversaries. Recently, many researches have been worked methods that have access to resources in ubiquitous applications. However they are inadequate to meet the requirement for privacy safeguard and dynamic changes. In this paper we propose how to protect sensitive data and present extended Role Based Access Control (RBAC) that respond to all the requirements for privacy control. We also show how proposed model preserves safety properties in spite of dynamic changes to access control permission.