DRBAC model using a WSNM for services in i-Home

Jong Hyuk Park, Sangjin Lee, In Hwa Hong

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)

    Abstract

    RBAC (Role Based Access Control) was added the concept of the role which user can have access to resources based on the role of the user, and it increased efficiency and expandability. But, evolution of computing power and internet technology has caused the up rise of the dynamic environments, in accordance with it, it will be expected to require a dynamic access control model considering various elements. In this paper, we propose DRBAC (Dynamic RBAC) model in intelligent Home (i-Home). This is an access control model suitable for user-oriented service in i-Home. In order to consider dynamic environment in the existing RBAC models, the proposed model executes assignments user-role and permission-role based on context. In addition, the proposed model provides scalable access control policies which are suitable for the characteristics of intelligent environment as considering the user location information as a temporary constraints condition. Furthermore, we design and implement WSNM (Wireless Sensor Network Module) for its services. Finally, the proposed model provides flexible and efficient authentication method which applied Domain-Group concept as well as user / device authentication.

    Original languageEnglish
    Pages (from-to)2831-2837
    Number of pages7
    JournalIEICE Transactions on Information and Systems
    VolumeE89-D
    Issue number12
    DOIs
    Publication statusPublished - 2006 Dec

    Keywords

    • Context
    • DRBAC
    • Intelligent Home
    • Wireless sensor network module

    ASJC Scopus subject areas

    • Software
    • Hardware and Architecture
    • Computer Vision and Pattern Recognition
    • Electrical and Electronic Engineering
    • Artificial Intelligence

    Fingerprint

    Dive into the research topics of 'DRBAC model using a WSNM for services in i-Home'. Together they form a unique fingerprint.

    Cite this