Role-Based Access Control Models
Computer
Inside Java 2 platform security architecture, API design, and implementation
Inside Java 2 platform security architecture, API design, and implementation
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
The Ubiquitous Provisioning of Internet Services to Portable Devices
IEEE Pervasive Computing
Framework for the Semantic Web: An RDF Tutorial
IEEE Internet Computing
Policy-Driven Management of Agent Systems
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Dynamic Binding in Mobile Applications: A Middleware Approach
IEEE Internet Computing
An approach to engineer and enforce context constraints in an RBAC environment
Proceedings of the eighth ACM symposium on Access control models and technologies
On context in authorization policy
Proceedings of the eighth ACM symposium on Access control models and technologies
Context-Aware Middleware for Resource Management in the Wireless Internet
IEEE Transactions on Software Engineering
A generic framework for context-based distributed authorizations
CONTEXT'03 Proceedings of the 4th international and interdisciplinary conference on Modeling and using context
Sharing digital rights with domain licensing
Proceedings of the 4th ACM international workshop on Contents protection and security
A programming environment for ubiquitous computing environment
ACM SIGPLAN Notices
A resource and context model for mobile middleware
Personal and Ubiquitous Computing - Special Issue: Selected Papers of the ARCS06 Conference
Location constraints in digital rights management
Computer Communications
RBAC-based access control for privacy protection in pervasive environments
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Working set-based access control for network file systems
Proceedings of the 14th ACM symposium on Access control models and technologies
Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems
Mobile Networks and Applications
Context RBAC/MAC access control for ubiquitous environment
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
CASPER: mining personalized services
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Combined resource and context model for qos-aware mobile middleware
ARCS'06 Proceedings of the 19th international conference on Architecture of Computing Systems
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Towards a framework to characterize ubiquitous software projects
Information and Software Technology
Ontology-based access control model for security policy reasoning in cloud computing
The Journal of Supercomputing
Hi-index | 0.00 |
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. In particular, mobility of users/devices causes frequent and unpredictable changes in physical user location and in consequently available resources and services. Users can also change portable access devices, with different capabilities, even at runtime and during the same service session, thus forcing us to consider very dynamic aspects even due to client heterogeneity. Access control to resources is crucial to leverage the provision of ubiquitous services and calls for novel solutions based on various context information, e.g., user/device location, device properties, user needs, local resource visibility. This paper presents a novel access control model built upon the concept of context as the first-class design principle to rule access to resources. As key features, this model allows to associate access control permissions with contexts where users operate and users acquire/lose their permissions when entering/leaving a specific context. Unlike traditional access control solutions where user identity/role triggers policy evaluation when requesting resource access, this model exploits the user context to fully determine the set of available permissions. In addition, the proposed model allows to express context-based access control policies at a high level of abstraction cleanly separate from service logic implementation, thus promoting dynamic policy modification with no impact on the service code. The paper shows the implementation of the proposed model in the UbiCOSM framework and presents a mobile office service provisioning scenario.