DocumentCode :
2282567
Title :
An Access Control Model for Ubiquitous Computing Application
Author :
Ya-Jun, Guo ; Fan, Hong ; Qing-Guo, Zhang ; Rong, Li
Author_Institution :
Sch. of Comput. Sci.&Technol., Huazhong Univ. of Sci.&Technol., Wuhan
fYear :
2005
fDate :
15-17 Nov. 2005
Firstpage :
1
Lastpage :
6
Abstract :
Traditional computer system depends on access policy and user´s identities to grant or deny their access to resources. The basic assumption in this system is the entities had been known. It is unsuitable to use identity-based access control in ubiquitous computing environment where entities are not foreknown to each other. In this paper, we present a trust based access control model to secure ubiquitous computing application. The resource-constrained trust negotiation is addressed to establish initial trust for authenticating strangers. By the initial trust, each user is arranged a role subset, and context information dynamic decides which role is active
Keywords :
resource allocation; telecommunication security; ubiquitous computing; context information dynamic; identity-based access control; resource-constrained trust negotiation; trust based access control model; ubiquitous computing application; RCTN; pervasive computing; trust negotiation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Technology, Applications and Systems, 2005 2nd International Conference on
Conference_Location :
Guangzhou
Print_ISBN :
981-05-4573-8
Type :
conf
DOI :
10.1109/MTAS.2005.244173
Filename :
1656786
Link To Document :
بازگشت