Context-aware access control mechanism for ubiquitous applications

Young Gab Kim, Chang Joo Mon, Dongwon Jeong, Jeong Oog Lee, Chee Yang Song, Doo Kwon Baik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

41 Citations (Scopus)

Abstract

With a rapid development of ubiquitous computing technology in the home and community, users can access information anytime and anywhere via personal devices such as PDA and internet mobile phone. Similarly, more flexible access control is required in the ubiquitous applications. In this paper, we propose a context-aware access control mechanism, which dynamically grants and adapts permissions to users according to the current context. We extend the role-based access control(RBAC) model to deal with the context information in ubiquitous environment. Unlike the traditional RBAC, the proposed access control mechanism can consider context information such as location, time and system resources by the context-aware agent and state checking matrix(SCM).

Original languageEnglish
Title of host publicationAdvances in Web Intelligence - Third International Atlantic Web Intelligence Conference, AWIC 2005, Proceedings
PublisherSpringer Verlag
Pages236-242
Number of pages7
ISBN (Print)3540262199, 9783540262190
DOIs
Publication statusPublished - 2005
EventThird International Atlantic Web Intelligence Conference on Advances in Web Intelligence, AWIC 2005 - Lodz, Poland
Duration: 2005 Jun 62005 Jun 9

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3528 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherThird International Atlantic Web Intelligence Conference on Advances in Web Intelligence, AWIC 2005
Country/TerritoryPoland
CityLodz
Period05/6/605/6/9

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Context-aware access control mechanism for ubiquitous applications'. Together they form a unique fingerprint.

Cite this