skip to main content
10.1145/1146847.1146853acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoscaleConference Proceedingsconference-collections
Article

Ubiquitous computing environments and its usage access control

Published: 30 May 2006 Publication History

Abstract

Ubiquitous computing aims to enhance computer use by utilizing many computer resources available through physical environments, but also making them invisible to users. The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. This ubiquitous computing poses new security challenges while the information can be accessed at anywhere and anytime because it may be applied by criminal users. The information may contain private information that cannot be shared by all user communities. Several approaches are designed to protect information for pervasive environments. However, ad-hoc mechanisms or protocols are typically added in the approaches by compromising disorganized policies or additional components to protect from unauthorized access.Usage control has been considered as the next generation access control model with distinguishing properties of decision continuity. In this paper, we present a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents. The model not only supports complex constraints for pervasive computing, such as services, devices and data types but also provides a mechanism to build rich reuse relationships between models and objects. Finally, comparisons with related works are analysed.

References

[1]
M. Weiser, "Hot topics-ubiquitous computing," Computer, Vol. 26, no. 10, pp. 71--72, 1993.
[2]
W. Edwards, M. Newman and J. Sedivy, "Building the ubiquitous computing user experience," in CHI '01: CHI '01 extended abstracts on Human factors in computing systems. New York, NY, USA: ACM Press, 2001, pp. 501--502.
[3]
G. Zhang and M. Parashar, "Context-aware dynamic access control for pervasive applications," in CND'04: Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference. Society for Modeling and Simulation International, 2004, pp. 21--30.
[4]
J. Seigneur and C. Jensen, "Trust enhanced ubiquitous payment without too much privacy loss," in SAC '04: Proceedings of the 2004 ACM symposium on Applied computing. New York, NY, USA: ACM Press, 2004, pp. 1593--1599.
[5]
G. Sampemane, P. Naldurg and R. Campbell, "Access control for active spaces," in ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference. Washington, DC, USA: IEEE Computer Society, 2002, p. 343.
[6]
P. Viswanathan, B. Gill and R. Campbell, "Security architecture in gaia," Champaign, IL, USA, Tech. Rep., 2001.
[7]
J. JA1-Muhtadi, R. Campbell, A. Kapadia, M. Mickunas and S. Yi, "Routing through the mist: Privacy preserving communication in ubiquitous computing environments," in ICDCS '02: Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02). Washington, DC, USA: IEEE Computer Society, 2002, p. 74.
[8]
R. Sandhu, "Role activation hierarchies," in Third ACM Workshop on RoleBased Access Control. ACM Press, October 1998, pp. 33--40.
[9]
H. Wang, J. Li, R. Addie, S. Dekeyser and R. Watson, "A framework for role-based group delegation in distributed environment," in Proceedings of the 29th Australasian Computer Science Conference. Australian Computer Society, 2006.
[10]
J. Park and R. Sandhu, "Towards usage control models: beyond traditional access control," in Proceedings of the seventh ACM symposium on Access control models and technologies. ACM Press, 2002, pp. 57--64.
[11]
ISO, "Security frameworks for open systems: Access control framework, ISO/IEC 10181--3," 1996.
[12]
H. Wedde and M. Lischka, "Role-based access control in ambient and remote space," in SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies. New York, NY, USA: ACM Press, 2004, pp. 21--30.
[13]
H. Wang, J. Cao and Y. Zhang, "Formal authorization allocation approaches for permission-role assignments using relational algebra operations," in Proceedings of the 14th Australian Database Conference ADC2003, Adelaide, Australia, 2003.
[14]
H. Wang, Y. Zhang, J. Cao and V. Varadharajan, "Achieving secure and flexible m-services through tickets," IEEE Transactions on Systems, Man, and Cybernetics, Part A, Special issue on M-Services, pp. 697--708, 2003.
[15]
H. Wang, J. Cao, Y. Zhang, "A flexible payment scheme and its role based access control," IIEEE Transactions on Knowledge and Data Engineering, Vol. 17, no. 3, pp. 425--436, 2005.
[16]
D. Goldschlag, M. Reed and P. Syverson, "Onion routing for anonymous and private Internet connections," Communications of the ACM, Vol. 24, no. 2, pp. 39--41, 1999.
[17]
S. Jajodia, P. Samarati, V. Subrahmanian and E. Bertino, "A unified framework for enforcing multiple access control policies," in Proceedings of the 1997 ACM SIGMOD international conference on Management of data. ACM Press, 1997, pp. 474--485.
[18]
E. Bertino, S. Castano, E. Ferrari and M. Mesiti, "Controlled access and dissemination of xml documents," in Proceedings of the second international workshop on Web information and data management. ACM Press, 1999, pp. 22--27.
[19]
E. Damiani, D. Sabrina, S. Paraboschi and P. Samarati, "Fine grained access control for soap e-services," in Proceedings of the tenth international conference on World Wide Web. ACM Press, 2001, pp. 504--513.
[20]
D. Sabrina, "An authorization model for temporal xml documents," in Proceedings of the 2002 ACM symposium on Applied computing. ACM Press, 2002, pp. 1088--1093.
[21]
Q. Li and V. Atluri, "Concept-level access control for the semantic web," in Proceedings of the 2003 ACM workshop on XML security. ACM Press, 2003, pp. 94--103.

Cited By

View all
  • (2024)A Review of Prediction Techniques used in the Stock MarketICST Transactions on Scalable Information Systems10.4108/eetsis.753511Online publication date: 13-Nov-2024
  • (2024)Cross-Sectional Analysis of Australian Dental Practitioners’ Perceptions of TeledentistryICST Transactions on Scalable Information Systems10.4108/eetsis.536611Online publication date: 16-Jul-2024
  • (2024)Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptographyPLOS ONE10.1371/journal.pone.030015319:5(e0300153)Online publication date: 9-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
InfoScale '06: Proceedings of the 1st international conference on Scalable information systems
May 2006
512 pages
ISBN:1595934286
DOI:10.1145/1146847
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 May 2006

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Acceptance Rates

InfoScale '06 Paper Acceptance Rate 33 of 91 submissions, 36%;
Overall Acceptance Rate 33 of 91 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Review of Prediction Techniques used in the Stock MarketICST Transactions on Scalable Information Systems10.4108/eetsis.753511Online publication date: 13-Nov-2024
  • (2024)Cross-Sectional Analysis of Australian Dental Practitioners’ Perceptions of TeledentistryICST Transactions on Scalable Information Systems10.4108/eetsis.536611Online publication date: 16-Jul-2024
  • (2024)Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptographyPLOS ONE10.1371/journal.pone.030015319:5(e0300153)Online publication date: 9-May-2024
  • (2024)Advancing MobileNet Security: Weighted Adversarial Learning in Convolutional Neural Networks2024 11th International Conference on Machine Intelligence Theory and Applications (MiTA)10.1109/MiTA60795.2024.10751690(1-8)Online publication date: 14-Jul-2024
  • (2024)Correlation Between Macro Economic Variables and Financial Sector Australian Share Market IndexDatabases Theory and Applications10.1007/978-981-96-1242-0_18(239-249)Online publication date: 13-Dec-2024
  • (2024)From Data to Insights: Constructing and Evaluating a Hospitality Dataset for Quadruple Aspect-Based Sentiment AnalysisWeb Information Systems Engineering – WISE 202410.1007/978-981-96-0579-8_8(102-113)Online publication date: 29-Nov-2024
  • (2024)Dynamic-Parameter Genetic Algorithm for Multi-objective Privacy-Preserving Trajectory Data PublishingWeb Information Systems Engineering – WISE 202410.1007/978-981-96-0576-7_4(46-57)Online publication date: 27-Nov-2024
  • (2022)Design and Development of Novel Routing Protocols for Ubiquitous Network2022 IEEE 7th International conference for Convergence in Technology (I2CT)10.1109/I2CT54291.2022.9824407(1-8)Online publication date: 7-Apr-2022
  • (2022)A domain-specific language for the specification of UCON policiesJournal of Information Security and Applications10.1016/j.jisa.2021.10300664:COnline publication date: 1-Feb-2022
  • (2020)Access Control Management for Ubiquitous ComputingAccess Control Management in Cloud Environments10.1007/978-3-030-31729-4_9(179-201)Online publication date: 30-Sep-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media