首页 | 本学科首页   官方微博 | 高级检索  
     


Access control management for ubiquitous computing
Authors:Hua  Yanchun  Jinli  
Affiliation:aDepartment of Maths and Computing, University of Southern Queensland, Toowoomba, QLD 4350, Australia;bSchool of Computer Science and Maths, Victoria University, Melbourne City, MC 8001, Australia;cDepartment of Computer Science and Computer Engineering, La Trobe University, Melbourne, VIC 3086, Australia
Abstract:The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. This ubiquitous computing poses new security challenges while the information can be accessed at anywhere and anytime because it may be applied by criminal users. Additionally, the information may contain private information that cannot be shared by all user communities. Several approaches are developed to protect information for pervasive environments against malicious users. However, ad hoc mechanisms or protocols are typically added in the approaches by compromising disorganized policies or additional components to protect from unauthorized access.In this paper, we present a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents. The model not only supports complex constraints for pervasive computing, such as services, devices and data types but also provides a mechanism to build rich reuse relationships between models and objects. Finally, comparisons with related works are analysed.
Keywords:Ubiquitous computing  Access management  Usage access control
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号