TY - GEN
T1 - RBAC-based access control framework for ensuring privacy in ubiquitous computing
AU - Hong, Sung Ho
AU - Cho, Eun Ae
AU - Moon, Chang Joo
AU - Baik, Doo Kwon
PY - 2006
Y1 - 2006
N2 - The Ubiquitous computing Environment is an environment that freely shares all data anytime, anywhere, and through any device without considering constraints. However, the personal or private information in ubiquitous computing could be disclosed, shared from anyone, or used maliciously without consent from the owner of the data. Thus, Privacy is one of the major issues in such an environment. Of many security methods, which are able to protect the privacy, The Role-Based Access Control (RBAC) model, a typical access control model within the enterprise environment, has been widely studied, applied to various applications, and implemented. However, much existing research for access control has not solved the privacy concerns within ubiquitous computing. This paper proposes a method and framework of user-centric and efficient access control to handle personal privacy within ubiquitous computing environment by using both proposed model based on core component of RBAC model and privacy policies.
AB - The Ubiquitous computing Environment is an environment that freely shares all data anytime, anywhere, and through any device without considering constraints. However, the personal or private information in ubiquitous computing could be disclosed, shared from anyone, or used maliciously without consent from the owner of the data. Thus, Privacy is one of the major issues in such an environment. Of many security methods, which are able to protect the privacy, The Role-Based Access Control (RBAC) model, a typical access control model within the enterprise environment, has been widely studied, applied to various applications, and implemented. However, much existing research for access control has not solved the privacy concerns within ubiquitous computing. This paper proposes a method and framework of user-centric and efficient access control to handle personal privacy within ubiquitous computing environment by using both proposed model based on core component of RBAC model and privacy policies.
UR - http://www.scopus.com/inward/record.url?scp=34247197668&partnerID=8YFLogxK
U2 - 10.1109/ICHIT.2006.253499
DO - 10.1109/ICHIT.2006.253499
M3 - Conference contribution
AN - SCOPUS:34247197668
SN - 0769526748
SN - 9780769526744
T3 - Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006
SP - 278
EP - 283
BT - Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006
T2 - 2006 International Conference on Hybrid Information Technology, ICHIT 2006
Y2 - 9 November 2006 through 11 November 2006
ER -