A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Communications of the ACM
Controlled access and dissemination of XML documents
Proceedings of the 2nd international workshop on Web information and data management
Fine grained access control for SOAP E-services
Proceedings of the 10th international conference on World Wide Web
Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
An authorization model for temporal XML documents
Proceedings of the 2002 ACM symposium on Applied computing
Computer
Building the ubiquitous computing user experience
CHI '01 Extended Abstracts on Human Factors in Computing Systems
Access Control for Active Spaces
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
ADC '03 Proceedings of the 14th Australasian database conference - Volume 17
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Security Architecture in Gaia
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
Concept-level access control for the Semantic Web
Proceedings of the 2003 ACM workshop on XML security
Role-based access control in ambient and remote space
Proceedings of the ninth ACM symposium on Access control models and technologies
A Flexible Payment Scheme and Its Role-Based Access Control
IEEE Transactions on Knowledge and Data Engineering
A framework for role-based group deligation in distributed environments
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
Achieving secure and flexible M-services through tickets
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Access control management for ubiquitous computing
Future Generation Computer Systems
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
New role-based access control in ubiquitous e-business environment
Journal of Intelligent Manufacturing
A purpose-based access control in native XML databases
Concurrency and Computation: Practice & Experience
Survey: Usage control in computer security: A survey
Computer Science Review
A Roadmap to the Introduction of Pervasive Information Systems in Healthcare
International Journal of Advanced Pervasive and Ubiquitous Computing
CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
Ubiquitous computing aims to enhance computer use by utilizing many computer resources available through physical environments, but also making them invisible to users. The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. This ubiquitous computing poses new security challenges while the information can be accessed at anywhere and anytime because it may be applied by criminal users. The information may contain private information that cannot be shared by all user communities. Several approaches are designed to protect information for pervasive environments. However, ad-hoc mechanisms or protocols are typically added in the approaches by compromising disorganized policies or additional components to protect from unauthorized access.Usage control has been considered as the next generation access control model with distinguishing properties of decision continuity. In this paper, we present a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents. The model not only supports complex constraints for pervasive computing, such as services, devices and data types but also provides a mechanism to build rich reuse relationships between models and objects. Finally, comparisons with related works are analysed.