Role-Based Access Control Models
Computer
TRBAC: a temporal role-based access control model
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Understanding and Using Context
Personal and Ubiquitous Computing
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
AICT-SAPIR-ELETE '05 Proceedings of the Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop
An Anonymous Context Aware Access Control Architecture For Ubiquitous Services
MDM '06 Proceedings of the 7th International Conference on Mobile Data Management
Context-Dependent Access Control for Contextual Information
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02
QACBAC: an owner-centric QoC-aware context-based access control model for pervasive environments
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
A spatio-temporal role-based access control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
PhotoMap - automatic spatiotemporal annotation for mobile photos
W2GIS'07 Proceedings of the 7th international conference on Web and wireless geographical information systems
A semantic approach and a web tool for contextual annotation of photos using camera phones
WISE'07 Proceedings of the 8th international conference on Web information systems engineering
Context-Role based access control for context-aware application
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
ISWC'06 Proceedings of the 5th international conference on The Semantic Web
Context-Aware access control mechanism for ubiquitous applications
AWIC'05 Proceedings of the Third international conference on Advances in Web Intelligence
CA-UCON: a context-aware usage control model
CASEMANS '11 Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems
Hi-index | 0.00 |
Pervasive Computing Environments enable new opportunities for users to share and to access resources anytime and anywhere in a more natural way, making access control a critical issue. These heterogeneous and dynamic sensor-rich environments characterized by frequent and unpredictable changes on user's, resource's, and environment situations, call for access control solutions that allow dynamically adjust access permissions based on information describing the conditions of these entities (context), such as location and time. Some research attempts have been done based on existing models, which context information is used as an optional attribute for limiting the scope of access control permissions. However, these approaches normally exploit identities and roles dynamically assigned to the users in order to grant access permissions, which is an inappropriate solution for open and dynamic environments which we cannot assume the existence of predefined roles and user-role associations. In this scenario, we claim that access permissions should be assigned to the users only based on context information characterizing the three most important entities of any access control framework: owners, requestors, and resources. Thus, this paper proposes a generalized context-based access control model for making access control decisions completely based on context information.