Wang, Hua and Zhang, Yanchun and Cao, Jinli (2006) Ubiquitous computing environments and its usage access control. In: 1st International Conference on Scalable Information Systems, 29 May - 1 Jun 2006, Hong Kong.
PDF (Accepted Version)
PDF (Published Version)
Ubiquitous computing aims to enhance computer
use by utilizing many computer resources available through
physical environments, but also making them invisible to users.
The purpose of ubiquitous computing is anywhere and anytime
access to information within computing infrastructures that is blended into a background and no longer be reminded. This
ubiquitous computing poses new security challenges while the
information can be accessed at anywhere and anytime because it may be applied by criminal users. The information may contain private information that cannot be shared by all user communities.
Several approaches are designed to protect information
for pervasive environments. However, ad-hoc mechanisms or
protocols are typically added in the approaches by compromising disorganized policies or additional components to protect from unauthorized access.
Usage control has been considered as the next generation
access control model with distinguishing properties of decision continuity. In this paper, we present a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents. The model not only supports complex constraints for pervasive computing, such as services, devices and data types
but also provides a mechanism to build rich reuse relationships between models and objects. Finally, comparisons with related works are analysed.
Statistics for this ePrint Item
|Item Type:||Conference or Workshop Item (Commonwealth Reporting Category E) (Paper)|
|Item Status:||Live Archive|
|Additional Information (displayed to public):||Author's version deposited in accordance with the copyright policy of the publisher. Copyright ACM 2006. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the 1st International Conference on Scalable Information Systems, 29 May - 1 Jun 2006, Hong Kong. (ACM International Conference Proceeding Series; Vol. 152).|
|Depositing User:||Dr Hua Wang|
|Faculty / Department / School:||Historic - Faculty of Sciences - Department of Maths and Computing|
|Date Deposited:||11 Oct 2007 00:57|
|Last Modified:||02 Jul 2013 22:42|
|Uncontrolled Keywords:||ubquitous control, access restrictions, object access,|
|Fields of Research (FoR):||08 Information and Computing Sciences > 0806 Information Systems > 080609 Information Systems Management|
Actions (login required)
|Archive Repository Staff Only|