Role-Based Access Control Models
Computer
Protection in operating systems
Communications of the ACM
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Role-Based Access Control
QACBAC: an owner-centric QoC-aware context-based access control model for pervasive environments
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
A generalized context-based access control model for pervasive environments
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Context-sensitive authorization in interaction patterns
Mobility '09 Proceedings of the 6th International Conference on Mobile Technology, Application & Systems
An intelligent information sharing control system for dynamic collaborations
Proceedings of the 8th International Conference on Frontiers of Information Technology
Benefits of Location-Based Access Control: A Literature Study
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Hi-index | 0.00 |
With a rapid development of ubiquitous computing technology in the home and community, users can access information anytime and anywhere via personal devices such as PDA and internet mobile phone. Similarly, more flexible access control is required in the ubiquitous applications. In this paper, we propose a context-aware access control mechanism, which dynamically grants and adapts permissions to users according to the current context. We extend the role-based access control(RBAC) model to deal with the context information in ubiquitous environment. Unlike the traditional RBAC, the proposed access control mechanism can consider context information such as location, time and system resources by the context-aware agent and state checking matrix(SCM).