Abstract
Applications in context-aware computing environment will be connected wireless network and various devices. According to, recklessness access of information resource can make trouble of system. So, access authority management is very important issue both information resource and adapt to system through founding security policy of needed system. But, existing security model is easy of approach to resource through simply user ID and password. This model has a problem that is not concerned about user’s environment information. In this paper, propose model of automated context-aware access control using ontology that can more efficiently control about resource through inference and judgment of context information that collect user’s information and user’s environment context information in order to ontology modeling.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ferraiolo, D.F., Cugini, J.A., Kuhn, D.R.: Role-Based Access Control (RBAC): Features and Motivations. In: 11th Annual Computer Security Application Conference (November 1995)
Sandhu, R.S., Coyne, E.J.: Role-Based Access Control Models. IEEE Computer 20(2), 38–47 (1996)
Sandhu, R.S., Ferraiolo, D., Kuhn, R.: The NIST Model for Role-Based Access Control: Towards a Unified Model Approach. In: 5th ACM Workshop on RBAC (August 2000)
Neumann, G., Strembeck, M.: An Approach to Engineer and Enforce Context Constraints in an RBAC Environment. In: 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003), pp. 65–79 (June 2003)
Covington, M.J., Moyer, M.J., Ahamad, M.: Generalized role-based access control for securing future application. In: NISSC, pp. 40–51 (October 2000)
Convington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: Context-aware Security Architecture for Emerging Applications. In: Security Applications Conference (ACSAC) (2002)
Biegel, G., Vahill, V.: A Framework for Developing Mobile, Context-aware Applications. In: IEEE International Conference on Pervasive Computing and Communications (PerCom) (2004)
Gu, T., Pung, H.K., Zhang, D.Q.: A Middleware for Building Context-Aware Mobile Services. In: Proceedings of IEEE Vehicular Technology Conference (VTC) (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jang, B., Jang, H., Choi, E. (2010). A Study on Automated Context-aware Access Control Model Using Ontology. In: Tomar, G.S., Chang, RS., Gervasi, O., Kim, Th., Bandyopadhyay, S.K. (eds) Advanced Computer Science and Information Technology. AST 2010. Communications in Computer and Information Science, vol 74. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13346-6_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-13346-6_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13345-9
Online ISBN: 978-3-642-13346-6
eBook Packages: Computer ScienceComputer Science (R0)