Role-Based access control model for ubiquitous computing environment

  • Authors:
  • Song-hwa Chae;Wonil Kim;Dong-kyoo Kim

  • Affiliations:
  • Graduate School of Information and Communication, Ajou University, Suwon, Korea;College of Electronics and Information Engineering, Sejong University, Seoul, Korea;College of Information and Computer Engineering, Ajou University, Suwon, Korea

  • Venue:
  • WISA'05 Proceedings of the 6th international conference on Information Security Applications
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Ubiquitous computing is characterized by freedom of movement in both time and location, which means users expect to receive services anytime and anywhere. Therefore, the security service should consider the factor of location and time. As a basic authorization service mechanism, RBAC has been used in the security community for access control model. In order to apply RBAC to ubiquitous computing environment, it is necessary to add both location and time dimension. In this paper, we propose new access control model supporting time and location dimensions. The proposed access control model can effectively support various ubiquitous computing environments.