Abstract
Increasing trends in pervasive computing demonstrate a requirement for context awareness. The security problem has also become a key issue with context awareness. Access control should execute its decisions by capturing security-relevant context, such as time, location, user activity, and other environmental information available when the access requests arrive. In previous context-aware access control systems, a query issued by an authorized user could not be answered when the context specified in access control policy do not exactly match that specified in the query, even though both are semantically related. In this paper, Semantic Context-aware Access Control (SCAC), is proposed, to solve the problem mentioned prior. The proposed SCAC system takes contexts and its ontologies from context middleware and subsequently arranges contexts according to the abstraction level, to build context hierarchies. Using context hierarchies and reasoning rules extracted from the context ontologies, SCAC can overcome the semantic gap between contexts specified in the policy and contexts collected from the dynamic context sources in pervasive environments.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This research was supported in part by university IT research center project (ITRC) funded by the Korean Ministry of Information and Communication and by Korea Science & Engineering Foundation (R01-2004-000-10755-0).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Weiser, M.: Hot Topics: Ubiquitous Computing. In IEEE the computer (1993)
Bellavista, P., Corradi, A., Stefanelli, C.: The Ubiquitous Provisioning of Internet Services to Portable Devices. IEEE Pervasive Computing 1(3) (2002)
Moyer, M.J., Covington, M.J., Ahamad, M.: Generalized role-based access control for securing future applications. In: NISSC 2000 23rd National Information Systems Security Conference (2000)
Covington, M.J., Srinivasan, S., Dey, A., Ahamad, M., Long, W., Abowd, G.: Securing context-aware applications using environment roles. In: SACMAT 2001 (2001)
Adam, N.R., Atluri, V.: A Content-based Authorization Model for Digital Libraries. IEEE Transactions on knowledge and data engineering, 14(2) (2002)
Kumar, A., Karnik, N., Chafle, G.: Context Sensitivity in Role-based Access Control. Operating Systems Review. IBM Journal 36(3) (2002)
Li Q., Atluri, V.: Concept-level Access Control for the Semantic Web. In: ACM Workshop on XML Security (2003)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role Based Access Control Models. IEEE Computer, 29(2) (February 1996)
Sandhu, R., Samarati, P.: Access control: principles and practice. IEEE Communication Magazine, 32 (1994)
Sandhu, R., Ferraiolo, D., Kuhm, R.: The NIST Model for Role-Based Access Control: Towards A Unified Standard. In: Proceedings of the fifth ACM workshop on Role-based access control (2000)
Ranganathan, A., Campbell, R.H.: An Infrastructure for context-awareness based on first-order logic. In Personal and Ubiquitous Computing, 7(6) (2003)
Wang, X.H., Xhang, D.Q., Gu, T., Pung, H.K.: Ontology Based Context Modeling and Reasoning using OWL. In: PerCom 2004 Annual Conference on Pervasive computing and Communications Workshop (2004)
Bellifemine, F., Poggi, A., Rimassa, G.: Developing multi agent systems with a FIPA-compliant agent framework. In: Software - Practice & Experience. John Wiley & Sons, Ltd., Chichester (2001)
Haarslev, V., Möller, R.: Racer: A Core Inference Engine for the Semantic Web. In: Proceedings of the 2nd International Workshop on Evaluation of Ontology-based Tools (EON 2003), located at the 2nd International Semantic Web Conference ISWC 2003, Sanibel Island, Florida, USA, October 20 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ko, H.J., Won, D.H., Shin, D.R., Choo, H.S., Kim, U.M. (2006). A Semantic Context-Aware Access Control in Pervasive Environments. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3981. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751588_18
Download citation
DOI: https://doi.org/10.1007/11751588_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34072-0
Online ISBN: 978-3-540-34074-4
eBook Packages: Computer ScienceComputer Science (R0)