Role-Based Access Control Models
Computer
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Flexible team-based access control using contexts
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A rule-based framework for role based delegation
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A context-related authorization and access control method based on RBAC:
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Understanding and Using Context
Personal and Ubiquitous Computing
Lattice-Based Access Control Models
Computer
PBDM: a flexible delegation model in RBAC
Proceedings of the eighth ACM symposium on Access control models and technologies
Access Control for Active Spaces
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
An introduction to multilevel secure relational database management systems
CASCON '04 Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
Role-Based Delegation Model/ Hierarchical Roles (RBDM1)
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
GEO-RBAC: a spatially aware RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
T-Engine: Japan's Ubiquitous Computing Architecture Is Ready for Prime Time
IEEE Pervasive Computing
Criticality Aware Access Control Model for Pervasive Applications
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
A Secure and Flexible Electronic-Ticket System
COMPSAC '09 Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 01
How to Securely Break into RBAC: The BTG-RBAC Model
ACSAC '09 Proceedings of the 2009 Annual Computer Security Applications Conference
Ubiquitous ID: Standards for Ubiquitous Computing and the Internet of Things
IEEE Pervasive Computing
Rumpole: a flexible break-glass access control model
Proceedings of the 16th ACM symposium on Access control models and technologies
Context-Role based access control for context-aware application
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Hi-index | 0.00 |
Context-awareness is a quintessential feature of ubiquitous computing. Contextual information not only facilitates improved applications, but can also become significant security parameters -- which in turn can potentially ensure service delivery not to anyone anytime anywhere, but to the right person at the right time and place. Specially, in determining access control to resources, contextual information can play an important role. Access control models, as studied in traditional computing security, however, have no notion of context-awareness; and the recent works in the nascent field of context-aware access control predominantly focus on spatio-temporal contexts, disregarding a host of other pertinent contexts. In this paper, with a view to exploring the relationship of access control and context-awareness in ubiquitous computing, we propose a comprehensive context-aware access control model for ubiquitous healthcare services. We explain the design, implementation and evaluation of the proposed model in detail. We chose healthcare a representative application domain because healthcare systems pose an array of non-trivial context-sensitive access control requirements, many of which are directly or indirectly applicable to other context-aware ubiquitous computing applications.