The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
A Context-Aware Role-Based Access Control Model for Web Services
ICEBE '05 Proceedings of the IEEE International Conference on e-Business Engineering
A Context-Aware Access Control Model for Pervasive Computing Environments
IPC '07 Proceedings of the The 2007 International Conference on Intelligent Pervasive Computing
Context-Aware Environment-Role-Based Access Control Model for Web Services
MUE '08 Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering
A generalized context-based access control model for pervasive environments
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Privacy context model for dynamic privacy adaptation in ubiquitous computing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Hi-index | 0.00 |
Usage CONtrol (UCON) model is the latest major enhancement of the traditional access control models which enables mutability of subject and object attributes, and continuity of control on usage of resources. In UCON, access permission decision is based on three factors: authorisations, obligations and conditions. While authorisations and obligations are requirements that must be fulfilled by the subject and the object, conditions are subject and object independent requirements that must be satisfied by the environment. As a consequence, access permission may be revoked (and the access stopped) as a result of changes in the environment regardless of whether the authorisations and obligations re-quirements are met. This constitutes a major shortcoming of the UCON model in pervasive computing systems which constantly strive to adapt to environmental changes so as to minimise disruptions to the user. To overcome this limitation, this paper proposes a Context-Aware Usage CONtrol (CA-UCON) model which extends the traditional UCON model to enable adaptation to environmental changes in the aim of preserving continuity of access. When the authori-sations and obligations requirements are met by the subject and the object, and the conditions requirements fail due to changes in the environment or the system context, CA-UCON model triggers specific actions to adapt to the new situation. Besides the data protection. CA-UCON model so enhances the quality of services, striving to keep explicit interactions with the user at a minimum.