Title
A flexible and scalable access control for ubiquitous computing environments
Abstract
The ubiquity and invisibility characteristics of ubiquitous computing (ubicomp) arise many security problems, especially in the field of access control. Some important issues that are needed to be addressed in access control design are: (1) Ubicomp environment is composed of huge amount of entities. Therefore, determination of access rights must be based on role or group of role, instead of individuals. (2) The context (e.g. user’s location, user’s need, etc) changes dynamically over time. Hence authorization of user’s accessibility is required to be based on such contextual information for proper enforce-ment of the required policies. (3) Users may not know what credentials are to be provided to access a specific service. In that case, the delivery service must support some interaction mechanism to explicitly acquire necessary credentials from users. (4) Numerous entities, roaming across different domains in ubiquitous network, are usually unknown to the local system. Access control should be based on the notion of trust to grant privileges in such circumstances. Lots of works have been done in the area of access control. Most of them have followed any of the four main approaches: Role-based Access Control (RBAC), Policy-based Access Control (PBAC), Context-based Access Control (CBAC), and Trust-based Access Control (TBAC). However, each of these approaches itself can not fulfill such security requirements of ubicomp. Hence we propose a Hybrid Access Control (HAC) model to tackle the problems of these approaches while taking their major advantages. HAC is hybrid of RBAC, PBAC, CBAC, and TBAC.
Year
DOI
Venue
2006
10.1007/11760146_91
ISI
Keywords
Field
DocType
policy-based access control,hybrid access control,access control,context-based access control,access right,scalable access control,delivery service,ubiquitous computing environment,role-based access control,trust-based access control,required policy,access control design,local system,ubiquitous computing,role based access control
Data mining,Computer access control,World Wide Web,Computer science,Computer security,Role-based access control,Discretionary access control,Access control,Ubiquitous computing,Physical access,Roaming,Scalability
Conference
Volume
ISSN
ISBN
3975
0302-9743
3-540-34478-0
Citations 
PageRank 
References 
0
0.34
1
Authors
5
Name
Order
Citations
PageRank
Le Xuan Hung119415.73
Nguyen Ngoc Diep2504.50
Yonil Zhung3796.91
Sungyoung Lee42932279.41
Young-Koo Lee52073188.97