An Access Control Framework for Pervasive Computing Environments

نویسندگان

  • Sarah Javanmardi
  • Hadi Hemmati
  • Rasool Jalili
چکیده

The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven conditioning. One of the key challenges in such environments is how to manage security and access control. A suitable approach for managing access control in pervasive computing environments should consider different features of such environment which are not supported by traditional access control mechanisms. The features impose the access control mechanisms to satisfy especial requirements. In this paper, we propose an access control framework supporting different requirements of pervasive computing technology. The framework is capable of providing solutions to the requirements by some functionalities such as decision making based on user intent and in an invisible manner and reauthorization of granted services based on context

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Time-constraint Access Control in Pervasive Computing Environments

This paper presents a novel access control model named PC-TRBAC (Time-constraint Role-based access control for Pervasive Computing). We give a detail analysis of the access control characteristics in the pervasive computing environments and the overview of the traditional access control model. In order to adapt to the pervasive computing, we add some time constraints into our new access control...

متن کامل

Towards a localisation of trust framework for pervasive environments

Pervasive computing envisions an environment in which we are surrounded by many embedded computer devices. The existence of those networked devices provides us with a mobile, spontaneous and dynamic way to access various resources provided by different (security policy) domains. In recent years, we have witnessed the evolutionary development of numerous multiple domain applications. One of the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006