Role-Based Access Control Models
Computer
Optimistic security: a new access control paradigm
Proceedings of the 1999 workshop on New security paradigms
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Access Control for Active Spaces
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
A Policy Language for a Pervasive Computing Environment
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Obligation Monitoring in Policy Management
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Context-Based Access Control Management in Ubiquitous Environments
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
A selective sampling approach to active feature selection
Artificial Intelligence
IEEE Transactions on Dependable and Secure Computing
Criticality Aware Access Control Model for Pervasive Applications
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
Ubiquitous computing environments and its usage access control
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Performance modeling of critical event management for ubiquitous computing applications
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
Privacy preserving multi-factor authentication with biometrics
Proceedings of the second ACM workshop on Digital identity management
Regulating Exceptions in Healthcare Using Policy Spaces
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Absence makes the heart grow fonder: new directions for implantable medical device security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Ayushman: a wireless sensor network based health monitoring infrastructure and testbed
DCOSS'05 Proceedings of the First IEEE international conference on Distributed Computing in Sensor Systems
Security and management policy specification
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
The article presents an access control model called Criticality Aware Access Control (CAAC) for criticality (emergency) management in smart infrastructures. Criticalities are consequences of events which take a system (in our case, a smart infrastructure) into an unstable state. They require the execution of specific response actions in order to bring them under control. The principal aim of CAAC is to grant the right set of access privileges (to facilitate response action execution), at the right time, to the right set of subjects, for the right duration, in order to control the criticalities within the system. In this regard, the CAAC model uses a stochastic model called the Action Generation Model to determine the required response actions for the combination of criticalities present within the system. It then facilitates response actions by adaptively altering the privileges to specific subjects, in a proactive manner, without the need for any explicit access requests. In this article, we formalize the CAAC model and validate it based on two design goals - proactivity and adaptiveness. Finally, we present a case study demonstrating CAAC’s operation on an oil-rig platform in order to aid in the response to health- and fire-related criticalities.