RBAC-based access control framework for ensuring privacy in ubiquitous computing

Sung Ho Hong, Eun Ae Cho, Chang Joo Moon, Doo Kwon Baik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The Ubiquitous computing Environment is an environment that freely shares all data anytime, anywhere, and through any device without considering constraints. However, the personal or private information in ubiquitous computing could be disclosed, shared from anyone, or used maliciously without consent from the owner of the data. Thus, Privacy is one of the major issues in such an environment. Of many security methods, which are able to protect the privacy, The Role-Based Access Control (RBAC) model, a typical access control model within the enterprise environment, has been widely studied, applied to various applications, and implemented. However, much existing research for access control has not solved the privacy concerns within ubiquitous computing. This paper proposes a method and framework of user-centric and efficient access control to handle personal privacy within ubiquitous computing environment by using both proposed model based on core component of RBAC model and privacy policies.

Original languageEnglish
Title of host publicationProceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006
Pages278-283
Number of pages6
DOIs
Publication statusPublished - 2006
Event2006 International Conference on Hybrid Information Technology, ICHIT 2006 - Cheju Island, Korea, Republic of
Duration: 2006 Nov 92006 Nov 11

Publication series

NameProceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006
Volume1

Other

Other2006 International Conference on Hybrid Information Technology, ICHIT 2006
Country/TerritoryKorea, Republic of
CityCheju Island
Period06/11/906/11/11

ASJC Scopus subject areas

  • Media Technology

Fingerprint

Dive into the research topics of 'RBAC-based access control framework for ensuring privacy in ubiquitous computing'. Together they form a unique fingerprint.

Cite this