Skip to main content

A Study on Automated Context-aware Access Control Model Using Ontology

  • Conference paper
Advanced Computer Science and Information Technology (AST 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 74))

  • 398 Accesses

Abstract

Applications in context-aware computing environment will be connected wireless network and various devices. According to, recklessness access of information resource can make trouble of system. So, access authority management is very important issue both information resource and adapt to system through founding security policy of needed system. But, existing security model is easy of approach to resource through simply user ID and password. This model has a problem that is not concerned about user’s environment information. In this paper, propose model of automated context-aware access control using ontology that can more efficiently control about resource through inference and judgment of context information that collect user’s information and user’s environment context information in order to ontology modeling.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ferraiolo, D.F., Cugini, J.A., Kuhn, D.R.: Role-Based Access Control (RBAC): Features and Motivations. In: 11th Annual Computer Security Application Conference (November 1995)

    Google Scholar 

  2. Sandhu, R.S., Coyne, E.J.: Role-Based Access Control Models. IEEE Computer 20(2), 38–47 (1996)

    Google Scholar 

  3. Sandhu, R.S., Ferraiolo, D., Kuhn, R.: The NIST Model for Role-Based Access Control: Towards a Unified Model Approach. In: 5th ACM Workshop on RBAC (August 2000)

    Google Scholar 

  4. Neumann, G., Strembeck, M.: An Approach to Engineer and Enforce Context Constraints in an RBAC Environment. In: 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003), pp. 65–79 (June 2003)

    Google Scholar 

  5. Covington, M.J., Moyer, M.J., Ahamad, M.: Generalized role-based access control for securing future application. In: NISSC, pp. 40–51 (October 2000)

    Google Scholar 

  6. Convington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: Context-aware Security Architecture for Emerging Applications. In: Security Applications Conference (ACSAC) (2002)

    Google Scholar 

  7. Biegel, G., Vahill, V.: A Framework for Developing Mobile, Context-aware Applications. In: IEEE International Conference on Pervasive Computing and Communications (PerCom) (2004)

    Google Scholar 

  8. Gu, T., Pung, H.K., Zhang, D.Q.: A Middleware for Building Context-Aware Mobile Services. In: Proceedings of IEEE Vehicular Technology Conference (VTC) (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jang, B., Jang, H., Choi, E. (2010). A Study on Automated Context-aware Access Control Model Using Ontology. In: Tomar, G.S., Chang, RS., Gervasi, O., Kim, Th., Bandyopadhyay, S.K. (eds) Advanced Computer Science and Information Technology. AST 2010. Communications in Computer and Information Science, vol 74. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13346-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13346-6_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13345-9

  • Online ISBN: 978-3-642-13346-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics