Role-Based Access Control Models
Computer
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A Context-Aware Security Architecture for Emerging Applications
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Cerberus: A Context-Aware Security Scheme for Smart Spaces
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Context-Aware Computing Applications
WMCSA '94 Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications
Introduction to this special issue on context-aware computing
Human-Computer Interaction
Context-Role based access control for context-aware application
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Hi-index | 0.01 |
This paper presents the context based authentication and authorization management system for security management in the pervasive computing environment. we explored security considerations of the pervasive computing environment. The proposed system adopts the context-role based access control model as access control model for enforcement of access control service based on various context information. We also studied the methodology to apply partial credential to user authentication. We introduce the authentication confidence index for applying the partial credential to authentication mechanisms. The authentication confidence index is also used for user-role activation in the access control service. This paper shows comparison between our system and related works, such as Cerberus and CASA.