A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing


Yixin Jing, Jinhyung Kim, Dongwon Jeong, Journal of Information Processing Systems Vol. 2, No. 1, pp. 28-33, Mar. 2006  


Keywords: access control, Ubiquitous Computing, Task computing, Context-Awareness
Fulltext:

Abstract

The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a lightweight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Jing, Y., Kim, J., & Jeong, D. (2006). A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing. Journal of Information Processing Systems, 2(1), 28-33. DOI: .

[IEEE Style]
Y. Jing, J. Kim, D. Jeong, "A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing," Journal of Information Processing Systems, vol. 2, no. 1, pp. 28-33, 2006. DOI: .

[ACM Style]
Yixin Jing, Jinhyung Kim, and Dongwon Jeong. 2006. A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing. Journal of Information Processing Systems, 2, 1, (2006), 28-33. DOI: .