Abstract
Anywhere and anytime access to information within computing infrastructures is a purpose of ubiquitous computing. The new security challenges are posed while the information can be accessed at anywhere and anytime since it may be applied by malicious users. A key issue in ubiquitous systems is not who can use sharing resources, but how to control the usage of sharing resources. Usage CONtrol (UCON) is a consolidated solution for this problem. However, the authorization mechanisms of ubiquitous systems do not offer elaborate authorization responses. We extend and improve the UCONA-based authorization policy specification based on a delegation certification offering an elaborate authorization response. Then we show the flexibility and expressive capability of our policy specification through an application example.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Park, J., Sandhu, R.: Towards Usage Control Models: Beyond Traditional Access Control. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), Monterey, California, pp. 57–64. ACM, New York (2002)
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-based Access Control. ACM Transactions on Information and System Security 4, 224–274 (2001)
Park, J., Sandhu, R.: The UCONABC Usage Control Model. ACM Transactions on Information and System Security 7, 128–174 (2004)
Zhang, X., Parisi-Presicce, F., Sandhu, R., et al.: Formal Model and Policy Specification of Usage Control. ACM Transactions on Information and System Security (TISSEC) 8, 351–387 (2005)
Lamport, L.: The Temporal Logic of Actions. ACM Transactions on Programming Languages and Systems 16, 872–923 (1994)
Martinelli, F., Mori, P.: A Model for Usage Control in Grid Systems. In: Proceedings of International Conference on Security, Trust and Privacy in Grid Systems (Grid-STP 2007), Nice, France, pp. 169–175. IEEE Press, Los Alamitos (2007)
Stagni, F., Arenas, A.E., Aziz, B.: On Usage Control in Data Grids. Technical Report, CoreGRID (2008)
Vardi, M.Y.: Branching vs. Linear Time: Final Showdown. In: Margaria, T., Yi, W. (eds.) TACAS 2001. LNCS, vol. 2031, pp. 1–22. Springer, Heidelberg (2001)
Chen, Z., Gui, J., Guo, Y.: Hierarchical-role Based Delegation Authorization Execution Model for Service Grid. Journal of Software 20, 2495–2510 (2009)
Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.: Toward a Usage-based Security Framework for Collaborative Computing Systems. ACM Transactions on Information and System Security (TISSEC) 11, 1–36 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gui, J., Chen, Z., Deng, X. (2011). An Improved UCONA-Based Authorization Policy Specification for Ubiquitous Systems. In: Yu, Y., Yu, Z., Zhao, J. (eds) Computer Science for Environmental Engineering and EcoInformatics. CSEEE 2011. Communications in Computer and Information Science, vol 158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22694-6_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-22694-6_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22693-9
Online ISBN: 978-3-642-22694-6
eBook Packages: Computer ScienceComputer Science (R0)