Abstract
This paper presents the context based authentication and authorization management system for security management in the pervasive computing environment. we explored security considerations of the pervasive computing environment. The proposed system adopts the context-role based access control model as access control model for enforcement of access control service based on various context information. We also studied the methodology to apply partial credential to user authentication. We introduce the authentication confidence index for applying the partial credential to authentication mechanisms. The authentication confidence index is also used for user-role activation in the access control service. This paper shows comparison between our system and related works, such as Cerberus and CASA.
This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement) (IITA-2006-C1090-0603-0028).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Park, S.-H., Han, Y.-J.: Context-Role Based Access Control for Context-Aware Application. In: Gerndt, M., Kranzlmüller, D. (eds.) HPCC 2006. LNCS, vol. 4208, pp. 572–580. Springer, Heidelberg (2006)
Korkea-aho, M.: Context-Aware Application Survey, Internetworking Seminar (Tik-110.551), Helsinki University of Technology (April 2000)
Schilit, B., Adams, N., et al.: Context-aware computing applications. In: WMCSA 1994, Santa Cruz, California, pp. 85–90. IEEE Computer Society Press, Los Alamitos (1994)
Zhang, G., Parashar, M.: Context-aware Dynamic Access Control for Pervasive Applications. In: 2004 Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS’04), San Diego, California (January 2004)
Convington, M.J., Long, W., et al.: Securing Context-Aware Applications Using Environment Roles. In: SACMAT 2001, Chantilly, Virginia (May 3-4, 2001)
Moran, T.P., Dourish, P.: Introduction to This Special Issue on Context-Aware Computing. Hunam Computer Interaction 16 (2001)
Sandhu, R.S., Coyne, E.J., et al.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)
Ferraiolo, D.F., Sandhu, R., et al.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security 4(3) (August 2001)
Al-Muhtadi, J., Ranganathan, A., et al.: Cerberus: A Context-Aware SEcurity Scheme for Smart Spaces. In: IEEE International Conference on Pervasive Computing and Communications (PerCom 2003), Dallas-Fort Worth, Texas (March 23-26, 2003)
Convington, M.J., Fogla, P., et al.: A Context-Aware Security Architecture for Emerging Applications. In: Proceedings of the 18th Annual Computer Security Applications Conference, p. 249 (2002)
Cerqueira, R., Hess, C.K., et al.: Gaia: A Development Infrastructure for Active Spaces. In: Workshop on Application Models and Programming Tools for Ubiquitous Computing (held in conjunction with the UBICOMP (2001)
Moyer, M.J., Ahamad, M.: Generalized role based access control. In: Proceedings of the 2001 International Conference on Distributed Computing Systems (ICDCS), Mesa (April 2001)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, SH., Han, YJ., Chung, TM. (2007). Context-Aware Security Management System for Pervasive Computing Environment. In: Kokinov, B., Richardson, D.C., Roth-Berghofer, T.R., Vieu, L. (eds) Modeling and Using Context. CONTEXT 2007. Lecture Notes in Computer Science(), vol 4635. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74255-5_29
Download citation
DOI: https://doi.org/10.1007/978-3-540-74255-5_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74254-8
Online ISBN: 978-3-540-74255-5
eBook Packages: Computer ScienceComputer Science (R0)