Activity-oriented access control for ubiquitous environments

Le Xuan Hung, Riaz Ahmed Shaikh, Hassan Jameel, S. M.K.R. Raazi, Yuan Weiwei, Ngo Trong Canh, P. T.H. Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)

    Abstract

    Recent research on ubiquitous computing has introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous computing environment. Existing access control approaches such as RBAC, became inappropriate to support this concept because they do not consider human activities. In this paper, we propose Activity-Oriented Access Control (AOAC) model, aiming to support user's activity in ubiquitous environments. We have designed and implemented our initial AOAC system. We also built up a simple scenario in order to illustrate how it supports user activities. The results have shown that AOAC meets our objectives. Also, AOAC it takes approximately 0.26 second to give a response which proves that AOAC is suitable to work in real-time environments.

    Original languageEnglish
    Title of host publication2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009
    DOIs
    Publication statusPublished - 2009
    Event2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009 - Las Vegas, NV, United States
    Duration: 2009 Jan 102009 Jan 13

    Publication series

    Name2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009

    Other

    Other2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009
    Country/TerritoryUnited States
    CityLas Vegas, NV
    Period09/1/1009/1/13

    Keywords

    • Access control
    • Activity
    • Ubiquitous computing

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Electrical and Electronic Engineering
    • Communication

    Fingerprint

    Dive into the research topics of 'Activity-oriented access control for ubiquitous environments'. Together they form a unique fingerprint.

    Cite this