An Access Control Framework for Pervasive Computing Environments

The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven conditioning. One of the key challenges in such environments is how to manage security and access control. A suitable approach for managing access control in pervasive computing environments should consider different features of such environment which are not supported by traditional access control mechanisms. The features impose the access control mechanisms to satisfy especial requirements. In this paper, we propose an access control framework supporting different requirements of pervasive computing technology. The framework is capable of providing solutions to the requirements by some functionalities such as decision making based on user intent and in an invisible manner and reauthorization of granted services based on context

[1]  Vincent M. Stanford,et al.  Pervasive Health Care Applications Face Tough Security Challenges , 2002, IEEE Pervasive Comput..

[2]  Mustaque Ahamad,et al.  A context-aware security architecture for emerging applications , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[3]  Xie Jun,et al.  Context-Aware Role-Based Access Control Model for Web Services , 2004 .

[4]  Stephen Hailes,et al.  An access control model based on distributed knowledge management , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[5]  David Garlan,et al.  Project Aura: Toward Distraction-Free Pervasive Computing , 2002, IEEE Pervasive Comput..

[6]  Seng Wai Loke,et al.  Methods for policy conflict detection and resolution in pervasive computing environments. , 2005, WWW 2005.

[7]  Simon S. Lam,et al.  Designing a distributed authorization service , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[8]  Hong Fan,et al.  A context-aware role-based access control model for Web services , 2005, IEEE International Conference on e-Business Engineering (ICEBE'05).

[9]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[10]  William Yurcik,et al.  Secure Smart Environments : Security Requirements , Challenges and Experiences in Pervasive Computing , 2005 .

[11]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[12]  Patrick Brézillon,et al.  Modeling context-based security policies with contextual graphs , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[13]  Ravi S. Sandhu,et al.  Models, protocols, and architectures for secure pervasive computing: challenges and research directions , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[14]  Jianhua Ma,et al.  A context based architecture for ubiquitous kid's safety care using space-oriented model , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[15]  Chan Yeob Yeun,et al.  Security for emerging ubiquitous networks , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[16]  José M. Troya,et al.  Applying the semantic Web layers to access control , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[17]  Li Qin,et al.  Concept-level access control for the Semantic Web , 2003, XMLSEC '03.

[18]  Krysia Broda,et al.  Policy Conflict Analysis Using Free Variable Tableaux for Access Control in Web Services Environments , 2005 .

[19]  Peter Steenkiste,et al.  Exploiting Information Relationships for Access Control , 2005, Third IEEE International Conference on Pervasive Computing and Communications.