Abstract
Context-awareness and security are critical issues in ubiquitous computing. In this paper we present a framework for context-aware authorization in ubiquitous computing environments. We present an architecture consisting of authorization infrastructure and context infrastructure. The context infrastructure provides context information and the authorization infrastructure makes decisions to grant access rights based on context-aware authorization policies and context information. This paper also describes how multiple nodes in distributed environments cooperate to perform evaluation and detection of context constraints and events included in authorization policies.
This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Hong, J.I., Landay, J.A.: An Infrastructure Approach to Context-Aware Computing. HCI Journal 16(2-3) (2001)
Judd, G., Steenkiste, P.: Providing Contextual Information to Pervasive Computing Application. In: IEEE PerCom 2003 (2003)
Al-Muhtadi, J., et al.: Cerberus: A Context-Aware Security Scheme for Smart Spaces. In: IEEE PerCom 2003 (2003)
Hoagland, J.A., et al.: Security Policy Specification using a Graphical Approach, Technical Report CSE-98-3, UC Davis Computer Science Dept. (July 1998)
Ortalo, R.: A Flexible Method for Information System Security Policy Specification. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 67–85. Springer, Heidelberg (1998)
Damianou, N., et al.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18–39. Springer, Heidelberg (2001)
Ranganathan, A., Campbell, R.H.: An infrastructure for context-Awareness based on First Order Logic. Pers. Ubiquit. Computing 7, 353–364 (2003)
Covington, M.J., et al.: Securing Context-Aware Applications using Environment Roles. In: SACMAT 2001 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shim, YC. (2006). Distributed Processing of Context-Aware Authorization in Ubiquitous Computing Environments. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3981. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751588_14
Download citation
DOI: https://doi.org/10.1007/11751588_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34072-0
Online ISBN: 978-3-540-34074-4
eBook Packages: Computer ScienceComputer Science (R0)