Pervasive computing context access control based on UCONABC model

Fang Pu*, Daoqin Sun, Qiying Cao, Haibin Cai, Fan Yang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations

Abstract

The proliferation of smart gadgets, appliances, mobile devices and sensors has enabled the construction of pervasive computing environment, transforming regular physical spaces into "Active Information Spaces". However, access control remains a major challenge for the deployment of this computing paradigm in real-life. A context access control model based on UCON ABC model is presented in this paper, which not only focuses on authorization, but also introduces obligations, and conditions. And it includes pre-authentication, pre-condition, pre-obligation, active-right and passive-right sub-models. The operations of sub-models are presented. And the security, flexibility and usefulness of our proposed model are demonstrated by a typical pervasive computing scenario.

Original languageEnglish
Title of host publicationProceedings - 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006
Pages689-692
Number of pages4
DOIs
StatePublished - 2006
Externally publishedYes
Event2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006 - Pasadena, CA, United States
Duration: 18 Dec 200620 Dec 2006

Publication series

NameProceedings - 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006

Conference

Conference2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006
Country/TerritoryUnited States
CityPasadena, CA
Period18/12/0620/12/06

Fingerprint

Dive into the research topics of 'Pervasive computing context access control based on UCONABC model'. Together they form a unique fingerprint.

Cite this