Wang, Hua and Zhang, Yanchun and Cao, Jinli (2008) Access control management for ubiquitous computing. Future Generation Computer Systems: The International Journal of Grid Computing: Theory, Methods and Applications, 24 (8). pp. 870-878. ISSN 0167-739X
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. This ubiquitous computing poses new security challenges while the information can be accessed at anywhere and anytime because it may be applied by criminal users. Additionally, the information may contain private information that cannot be shared by all user communities. Several approaches are developed to protect information for pervasive environments against malicious users.
However, ad hoc mechanisms or protocols are typically added in the approaches by compromising disorganized policies or additional components to protect from unauthorized access.
In this paper, we present a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents. The model not only supports complex constraints for pervasive computing, such as services,
devices and data types but also provides a mechanism to build rich reuse relationships between models and objects. Finally, comparisons with related works are analysed.
Statistics for this ePrint Item
|Item Type:||Article (Commonwealth Reporting Category C)|
|Item Status:||Live Archive|
|Additional Information (displayed to public):||© 2007 Elsevier B.V. Permanent restricted access to published version due to publisher copyright policy.|
|Depositing User:||Dr Hua Wang|
|Faculty / Department / School:||Historic - Faculty of Sciences - Department of Maths and Computing|
|Date Deposited:||03 Oct 2008 07:06|
|Last Modified:||12 Feb 2015 00:37|
|Uncontrolled Keywords:||access management; ubiquitous computing; usage access control; private information|
|Fields of Research (FoR):||08 Information and Computing Sciences > 0805 Distributed Computing > 080504 Ubiquitous Computing
08 Information and Computing Sciences > 0803 Computer Software > 080303 Computer System Security
08 Information and Computing Sciences > 0806 Information Systems > 080609 Information Systems Management
|Socio-Economic Objective (SEO):||E Expanding Knowledge > 97 Expanding Knowledge > 970108 Expanding Knowledge in the Information and Computing Sciences|
|Identification Number or DOI:||10.1016/j.future.2007.07.011|
Actions (login required)
|Archive Repository Staff Only|