Context-aware security service in RFID/USN environments using MAUT and extended GRBAC

This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware environment. It helps developers build secure services efficiently. A security service in a dynamic environment uses Multi-Attribute Utility Theory and extended Generalized Role-Based Access Control. The system uses attribute values in GRBAC to calculate the Security Level, and extend the GRBAC. We expect this model to be widely used in providing flexible security services in a heterogeneous network.

[1]  Mustaque Ahamad,et al.  A context-aware security architecture for emerging applications , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[2]  Mustaque Ahamad,et al.  Generalized Role-Based Access Control for Securing Future Applications , 2000 .

[3]  Teuvo Kohonen,et al.  Self-Organizing Maps , 2010 .

[4]  H. Raiffa,et al.  Decisions with Multiple Objectives , 1993 .

[5]  Ross J. Anderson,et al.  Robustness Principles for Public Key Protocols , 1995, CRYPTO.

[6]  Guanling Chen,et al.  A Survey of Context-Aware Mobile Computing Research , 2000 .

[7]  F. B. Vernadat,et al.  Decisions with Multiple Objectives: Preferences and Value Tradeoffs , 1994 .

[8]  Alfred C. Weaver,et al.  A Dynamic, Context-Aware Security Infrastructure , 2004 .

[9]  Mustaque Ahamad,et al.  Generalized role-based access control , 2001, Proceedings 21st International Conference on Distributed Computing Systems.

[10]  Music Musi Georgia Institute of Technology , 2002 .

[11]  R. L. Keeney,et al.  Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.

[12]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[13]  Gregory D. Abowd,et al.  Providing architectural support for building context-aware applications , 2000 .

[14]  John B. Kidd,et al.  Decisions with Multiple Objectives—Preferences and Value Tradeoffs , 1977 .

[15]  William Stallings,et al.  Cryptography and network security , 1998 .