Skip to main content

An User-Centric Attribute Based Access Control Model for Ubuquitous Environments

  • Conference paper

Abstract

The recent developments in mobile platforms are significant, both on the hardware and software fronts. With the huge success of the iPhone and Android phones, more and more companies are entering the mobile application market. However, there are increasing security threats for mobile phone users due to the new generation of attacks targeted purely on mobile environments. Several solutions have been proposed to date, which can generally handle consent in a fixed and coarse-grained way. However, with the increasing usage of mobile devices for high value transactions, the future access control from mobile devices should be based on ‘user-centric’ challenge response techniques based on the freatures of mobile platforms.The authors present the MLive© framework, a novel approach to establish mutual authentication between the users and the service providers using unique mobile based attirbutes to solve the threats in the mobile environments.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Facebook Press Room (2010), http://www.facebook.com/press/info.php?statistics

  2. Ardagna, C.A., De Capitani di Vimercati, S., Paraboschi, S., Pedrini, E., Samarati, P.: Ac XACML-based privacy-centered access control system. In: Proceedings of the First ACM Workshop on Information Security Governance, New York, NY, USA (2009)

    Google Scholar 

  3. Oh, S.: New role-based access control in ubiquitous e-business environment. Journal of Intelligent Manufacturing 21(5), 607–612 (2010)

    Article  Google Scholar 

  4. Ahmed, A.S., Laud, P.: Formal Security analysis of OpenID with GBA protocol. In: Proceedings of the 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems, Aalborg, Denmark (May 2011)

    Google Scholar 

  5. Ahmed, A.S., Laud P.: ProVerif model files for the OpenID with GBA protocol (2011), http://research.cyber.ee (last accessed March 30, 2011)

  6. Jrstad, I., Johansen, T.A., Bakken, E., Eliasson, C., Fiedler, M., Do van Thanh, M.: Releasing the potential of OpenID & SIM. In: Intelligence in Next Generation Networks. ICIN (October 2009)

    Google Scholar 

  7. Srirama, S.N., Jarke, M., Prinz, W.: A Performance Evaluation of Mobile Web Services Security. In: 3rd Internation. Conference on Web Information Systems and Technologies, March 3-6, pp. 386–392. INSTICC Press (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Li, F., Weerasinghe, D., Patel, D., Rajarajan, M. (2012). An User-Centric Attribute Based Access Control Model for Ubuquitous Environments. In: Zhang, J.Y., Wilkiewicz, J., Nahapetian, A. (eds) Mobile Computing, Applications, and Services. MobiCASE 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 95. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32320-1_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32320-1_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32319-5

  • Online ISBN: 978-3-642-32320-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics