Access control management for ubiquitous computing

Full text for this resource is not available from the Research Repository.

Wang, Hua, Zhang, Yanchun and Cao, Jinli (2008) Access control management for ubiquitous computing. Future Generation Computer Systems, 24 (8). pp. 870-878. ISSN 0167-739X

Abstract

The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. This ubiquitous computing poses new security challenges while the information can be accessed at anywhere and anytime because it may be applied by criminal users. Additionally, the information may contain private information that cannot be shared by all user communities. Several approaches are developed to protect information for pervasive environments against malicious users. However, ad hoc mechanisms or protocols are typically added in the approaches by compromising disorganized policies or additional components to protect from unauthorized access. In this paper, we present a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents. The model not only supports complex constraints for pervasive computing, such as services, devices and data types but also provides a mechanism to build rich reuse relationships between models and objects. Finally, comparisons with related works are analysed.

Item type Article
URI https://vuir.vu.edu.au/id/eprint/4032
Official URL http://www.sciencedirect.com/science/article/pii/S...
Subjects Historical > Faculty/School/Research Centre/Department > School of Engineering and Science
Historical > FOR Classification > 0806 Information Systems
Historical > SEO Classification > 8903 Information Services
Keywords ResPubID14741. ubiquitous computing, access management, usage access control, access control management, data protection, usage control models, pervasive computing
Citations in Scopus 38 - View on Scopus
Download/View statistics View download statistics for this item

Search Google Scholar

Repository staff login