A dynamic context aware role based access control model for wireless network's application case study in mobile GIS

ثبت نشده
چکیده

The security model proposed for the Geographic Information Systems (GIS) is a data, which is capable of visualizing technology and has the capability to apprehend, cache, verify, amalgamate, engineer and exhibit data with the help of digitized maps. It has enormous applications in the field of engineering, business management process, communication both in the private and public regions. A GIS can help increase an organization’s productivity and the quality of its decisions. Mobile GIS is a new research area in GIS. Over the last 10 years or above, there has been an information explosion that leads to have a lot of examples in GIS application which has resulted in many spatial data commodities for the distinct organizational functionalities. The applications clearly are favorable to the organizations which are confronting with the threat of implementing applications in Mobile GIS technology. The proposal is based on the working of the dynamic context aware role based access control model[6]. However, the GIS world is encountered with three dominant issues, which are (1). The progress beyond GIS deployment method in the system to make way for the next generation outstanding process, (2). New beliefs for remodeling the deployment of GIS applications to be able to adhere to dynamic requirements [1] and (3). To fathom and accomplish the Mobile GIS prospects owed to the startling evolution in wireless communication (WiMAX or Wi-Fi) technology. In our work, we present an overall analysis on wireless communication systems and the concept of Mobile GIS. The main research problems in Mobile GIS and the architecture is also a core problem. This kind of Mobile GIS architecture can solve the problem of client side mobile devices and improve efficiency of the Mobile GIS. With the above issues at backdrop, there is an inherent need to establish a standardized abstract ground work for perspective of Mobile GIS application and deploying it among organizations. For this purpose to over come the issues involved in forgery, replay and traceability there is a deployment of the dynamic context aware security model as depicted in the proposed model. This paper addresses the fact that this model can be applied for real time applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

متن کامل

Context-aware Modeling for Spatio-temporal Data Transmitted from a Wireless Body Sensor Network

Context-aware systems must be interoperable and work across different platforms at any time and in any place. Context data collected from wireless body area networks (WBAN) may be heterogeneous and imperfect, which makes their design and implementation difficult. In this research, we introduce a model which takes the dynamic nature of a context-aware system into consideration. This model is con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016