Abstract | ||
---|---|---|
Recent research on ubiquitous computing has introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous computing environment. Existing access control approaches such as RBAC, became inappropriate to support this concept because they do not consider human activities. In this paper, we propose Activity-Oriented Access Control (AOAC) model, aiming to support user's activity in ubiquitous environments. We have designed and implemented our initial AOAC system. We also built up a simple scenario in order to illustrate how it supports user activities. The results have shown that AOAC meets our objectives. Also, AOAC it takes approximately 0.26 second to give a response which proves that AOAC is suitable to work in real-time environments. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1109/CCNC.2009.4784990 | CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference |
Keywords | Field | DocType |
existing access control,human activity,activity-oriented access control,user activity,activity-based computing,ubiquitous computing environment,ubiquitous computing,initial aoac system,access control,new concept,ubiquitous environment,activity,computational modeling,real time,indexing terms,authorisation,security | Permission,World Wide Web,Computer science,Authorization,Role-based access control,Access control,Ubiquitous computing,Distributed computing | Conference |
Citations | PageRank | References |
0 | 0.34 | 8 |
Authors | ||
11 |
Name | Order | Citations | PageRank |
---|---|---|---|
Le Xuan Hung | 1 | 194 | 15.73 |
Riaz Ahmed Shaikh | 2 | 230 | 16.90 |
Hassan Jameel | 3 | 185 | 14.90 |
Syed Muhammad Khaliq-ur-Rahman Raazi | 4 | 0 | 0.34 |
Yuan Wei Wei | 5 | 312 | 29.13 |
Ngo Trong Canh | 6 | 41 | 3.83 |
P. T. H. Truc | 7 | 7 | 0.80 |
Sungyoung Lee | 8 | 2932 | 279.41 |
Heejo Lee | 9 | 1501 | 132.47 |
Yuseung Son | 10 | 9 | 1.26 |
Miguel Fernandes | 11 | 13 | 2.87 |