Skip to main content

Context-Aware Security Management System for Pervasive Computing Environment

  • Conference paper
Modeling and Using Context (CONTEXT 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4635))

Abstract

This paper presents the context based authentication and authorization management system for security management in the pervasive computing environment. we explored security considerations of the pervasive computing environment. The proposed system adopts the context-role based access control model as access control model for enforcement of access control service based on various context information. We also studied the methodology to apply partial credential to user authentication. We introduce the authentication confidence index for applying the partial credential to authentication mechanisms. The authentication confidence index is also used for user-role activation in the access control service. This paper shows comparison between our system and related works, such as Cerberus and CASA.

This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement) (IITA-2006-C1090-0603-0028).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Park, S.-H., Han, Y.-J.: Context-Role Based Access Control for Context-Aware Application. In: Gerndt, M., Kranzlmüller, D. (eds.) HPCC 2006. LNCS, vol. 4208, pp. 572–580. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Korkea-aho, M.: Context-Aware Application Survey, Internetworking Seminar (Tik-110.551), Helsinki University of Technology (April 2000)

    Google Scholar 

  3. Schilit, B., Adams, N., et al.: Context-aware computing applications. In: WMCSA 1994, Santa Cruz, California, pp. 85–90. IEEE Computer Society Press, Los Alamitos (1994)

    Google Scholar 

  4. Zhang, G., Parashar, M.: Context-aware Dynamic Access Control for Pervasive Applications. In: 2004 Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS’04), San Diego, California (January 2004)

    Google Scholar 

  5. Convington, M.J., Long, W., et al.: Securing Context-Aware Applications Using Environment Roles. In: SACMAT 2001, Chantilly, Virginia (May 3-4, 2001)

    Google Scholar 

  6. Moran, T.P., Dourish, P.: Introduction to This Special Issue on Context-Aware Computing. Hunam Computer Interaction 16 (2001)

    Google Scholar 

  7. Sandhu, R.S., Coyne, E.J., et al.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)

    Google Scholar 

  8. Ferraiolo, D.F., Sandhu, R., et al.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security 4(3) (August 2001)

    Google Scholar 

  9. Al-Muhtadi, J., Ranganathan, A., et al.: Cerberus: A Context-Aware SEcurity Scheme for Smart Spaces. In: IEEE International Conference on Pervasive Computing and Communications (PerCom 2003), Dallas-Fort Worth, Texas (March 23-26, 2003)

    Google Scholar 

  10. Convington, M.J., Fogla, P., et al.: A Context-Aware Security Architecture for Emerging Applications. In: Proceedings of the 18th Annual Computer Security Applications Conference, p. 249 (2002)

    Google Scholar 

  11. Cerqueira, R., Hess, C.K., et al.: Gaia: A Development Infrastructure for Active Spaces. In: Workshop on Application Models and Programming Tools for Ubiquitous Computing (held in conjunction with the UBICOMP (2001)

    Google Scholar 

  12. Moyer, M.J., Ahamad, M.: Generalized role based access control. In: Proceedings of the 2001 International Conference on Distributed Computing Systems (ICDCS), Mesa (April 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Boicho Kokinov Daniel C. Richardson Thomas R. Roth-Berghofer Laure Vieu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, SH., Han, YJ., Chung, TM. (2007). Context-Aware Security Management System for Pervasive Computing Environment. In: Kokinov, B., Richardson, D.C., Roth-Berghofer, T.R., Vieu, L. (eds) Modeling and Using Context. CONTEXT 2007. Lecture Notes in Computer Science(), vol 4635. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74255-5_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74255-5_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74254-8

  • Online ISBN: 978-3-540-74255-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics