ICAF: A Context-Aware Framework for Access Control

  • A. S. M. Kayes
  • Jun Han
  • Alan Colman
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7372)


Context-aware systems acquire and integrate multi-faceted knowledge about their environments in order to make decisions. A number of attempts to build frameworks for context-aware systems have been made, but these have not provided adequate support for context-aware access control. In this paper, we present a framework for context-aware access control and its prototype implementation. The framework includes a context model for classifying and capturing access control-oriented contextual information, a situation model for identifying and defining contextual conditions of concern, and a policy model for specifying context-aware access control policies.


Context-aware access control context modeling context reasoning situation modeling access control policy 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Weiser, M.: Some Computer Science Issues in Pervasive Computing. Communications of the ACM 36(7), 75–84 (1993)CrossRefGoogle Scholar
  2. 2.
    Dey, A.K.: Understanding and Using Context. Personal and Ubiquitous Computing 5(1), 4–7 (2001)CrossRefGoogle Scholar
  3. 3.
    Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based Access Control Models. IEEE Computer 29(2), 38–47 (1996)CrossRefGoogle Scholar
  4. 4.
    Covington, M.J., Moyer, M., Ahmad, M.: Generalized Role-based Access Control for Securing Future Applications. In: Proceedings of the 23rd National Information Systems Security Conference, Baltimore, USA (2000)Google Scholar
  5. 5.
    Bertino, E., Catania, B., Damini, M.L., Perlasca, P.: GEO-RBAC: A Spa-tially Aware RBAC. In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, pp. 29–37. ACM, New York (2005)CrossRefGoogle Scholar
  6. 6.
    Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments. In: Cruz, I., Decker, S., Allemang, D., Preist, C., Schwabe, D., Mika, P., Uschold, M., Aroyo, L.M. (eds.) ISWC 2006. LNCS, vol. 4273, pp. 473–486. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  7. 7.
    Wang, X.H., Zhang, D.Q., Gu, T., Pung, H.K.: Ontology Based Context Modeling and Reasoning Using OWL. In: Proceedings of the PerCom Workshops (2004)Google Scholar
  8. 8.
    Henricksen, K., Indulska, J., Rakotonirainy, A.: Modeling Context Information in Pervasive Computing Systems. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol. 2414, pp. 167–180. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • A. S. M. Kayes
    • 1
  • Jun Han
    • 1
  • Alan Colman
    • 1
  1. 1.Faculty of Information and Communication TechnologiesSwinburne University of TechnologyMelbourneAustralia

Personalised recommendations