Abstract
Ubiquitous computing is characterized by freedom of movement in both time and location, which means users expect to receive services anytime and anywhere. Therefore, the security service should consider the factor of location and time. As a basic authorization service mechanism, RBAC has been used in the security community for access control model. In order to apply RBAC to ubiquitous computing environment, it is necessary to add both location and time dimension. In this paper, we propose new access control model supporting time and location dimensions. The proposed access control model can effectively support various ubiquitous computing environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ubiquitous Computing. IEEE security and Privacy (2002)
Bussard, L., Roudier, Y.: Authentication in Ubiquitous Computing. In: Proceedings of UbiCom 2002 (2002)
Choun, E.: A Model and administration of Role Based Privileges Enforcing Separation of Duty. Ph.D. Dissertation, Ajou University (1998)
Ahn, G., Sandhu, R.: Role-Based Authorization Constraints Specification. ACM Transactions on Information and System Security 3(4), 207–226 (2000)
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A Temporal Role-Based Access Control Model. ACM Transactions on Information and System Security 4(3), 191–223 (2001)
Ferraiolo, D.F., Sandhu, R., Gavrila, E., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)
Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.: A Generalized Temporal Role Based Access Control Model. IEEE Transactions on Konwledge and Data Engineering 17(1), 4–23 (2005)
Hansen, F., Oleshchuk, V.: SRBAC: A Spatial Role-based Access Control Model for Mobile Systems. In: Proceedings of Nordec 2003, Gjovik, Norway (2003)
Joshi, J.B.D., Bertino, E., Ghafoor, A.: Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model. In: Proceedings of the 26th Annual International Computer Software and Application Conference (2002)
Joshi, J.B.D., Bertino, E., Ghafoor, A.: Temporal Hierarchy and Inheritance Semantics for GTRBAC. In: Proceedings of 7th ACM Symposium on Access Control Models and Technologies, Monterey, CA (2002)
Chae, S., Kim, W., Kim, D.: Efficient Role Based Access Control Method in Wireless Environment. In: Niemegeers, I.G.M.M., de Groot, S.H. (eds.) PWC 2004. LNCS, vol. 3260, pp. 431–439. Springer, Heidelberg (2004)
Chae, S., Kim, W., Kim, D.: A Novel Approach to Role-Based Access Control. In: Sloot, P.M.A., Abramson, D., Bogdanov, A.V., Gorbachev, Y.E., Dongarra, J., Zomaya, A.Y. (eds.) ICCS 2003. LNCS, vol. 2660, pp. 1060–1068. Springer, Heidelberg (2003)
Chae, S., Kim, W., Kim, D.: Role-based Access Control using Neural Network. In: Proceedings of SCI 2003, vol. 2, pp. 36–40 (2003)
Wedde, H.F., Lischka, M.: Role-based Access Control in Ambient and Remote Space. In: Proceedings of the 9th ACM symposium on Access control models and technologies (2004)
Fu, S., Xu, C.: A Coordinated Spatio-Temporal Access Control Model for Mobile Computing in Coalition Environments. In: Proceedings of 19th IEEE International Parallel and Distributed Processing Symposium (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chae, Sh., Kim, W., Kim, Dk. (2006). Role-Based Access Control Model for Ubiquitous Computing Environment. In: Song, JS., Kwon, T., Yung, M. (eds) Information Security Applications. WISA 2005. Lecture Notes in Computer Science, vol 3786. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11604938_28
Download citation
DOI: https://doi.org/10.1007/11604938_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31012-9
Online ISBN: 978-3-540-33153-7
eBook Packages: Computer ScienceComputer Science (R0)