The NTree: a two dimension partial order for protection groups
ACM Transactions on Computer Systems (TOCS)
Role-Based Access Control Models
Computer
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
How to do discretionary access control using roles
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
On the increasing importance of constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
Lattice-Based Access Control Models
Computer
The PRIMA System for Privilege Management, Authorization and Enforcement in Grid Environments
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform
Proceedings of the Fourth Annual ACIS International Conference on Computer and Information Science
An Effective Policy Management Framework Using RBAC model for Service Platform based on Components
SERA '06 Proceedings of the Fourth International Conference on Software Engineering Research, Management and Applications
Access Control Policy Management Framework based on RBAC in OSGi Service Platform
CIT '06 Proceedings of the Sixth IEEE International Conference on Computer and Information Technology
Enabling Smart Spaces with OSGi
IEEE Pervasive Computing
Service-Oriented Smart-Home Architecture Based on OSGi and Mobile-Agent Technology
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Roles in Information Systems: A Survey
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Secure knowledge management: confidentiality, trust, and privacy
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Constructing authorization systems using assurance management framework
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Flexible authorization in home network environments
Cluster Computing
Autonomous role discovery for collaborating agents
Software—Practice & Experience
Hi-index | 0.00 |
Today's home and local-area network environments consist of various types of personal equipments, network devices, and corresponding services. Since such prevalent home network environments frequently deal with private and sensitive information, it is crucial to legitimately provide access control for protecting such emerging environments. As a result, the open services gateway initiative (OSGi) attempted to address this critical issue. However, the current OSGi authorization mechanism is not rigorous enough to fulfill security requirements involved in dynamic OSGi environments. In this paper, we provide a systematic way to adopt a role-based access control (RBAC) approach in OSGi environments. We demonstrate how our authorization framework can achieve important RBAC features and enhance existing primitive access control modules in OSGi service environments. Also, we describe a proof-of-concept prototype of the proposed framework to discuss the feasibility of our approach using an open source implementation of OSGi framework known as Knopflerfish.