Role-Based Access Control Models
Computer
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
A Middleware Infrastructure for Active Spaces
IEEE Pervasive Computing
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
Specifying and enforcing constraints in role-based access control
Proceedings of the eighth ACM symposium on Access control models and technologies
An approach to engineer and enforce context constraints in an RBAC environment
Proceedings of the eighth ACM symposium on Access control models and technologies
Access Control for Active Spaces
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
A System to Specify and Manage Multipolicy Access Control Models
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Context-Based Access Control for Ubiquitous Service Provisioning
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Access control in collaborative systems
ACM Computing Surveys (CSUR)
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
A contextual role-based access control authorization model for electronic patient record
IEEE Transactions on Information Technology in Biomedicine
Hi-index | 0.00 |
Ubiquitous environment that is omnipresent is existent everywhere or seems to be always present. Such an environment is a next generation paradigm in which many invisible computers are integrated into background of our lives. However, it requires more secure technologies to protect privacy because user may access information without time and space restriction. In this paper, we propose the mechanism that a user is able to automatically access to resource by means of context aware on ubiquitous computing environments. For this purpose, we exploit Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies, and defines extended context rules.We also provide an advanced security authorization mechanism and show how to securely preserve properties despite of dynamic change of access control privilege.