skip to main content
10.1145/1146847.1146853acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoscaleConference Proceedingsconference-collections
Article

Ubiquitous computing environments and its usage access control

Authors Info & Claims
Published:30 May 2006Publication History

ABSTRACT

Ubiquitous computing aims to enhance computer use by utilizing many computer resources available through physical environments, but also making them invisible to users. The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. This ubiquitous computing poses new security challenges while the information can be accessed at anywhere and anytime because it may be applied by criminal users. The information may contain private information that cannot be shared by all user communities. Several approaches are designed to protect information for pervasive environments. However, ad-hoc mechanisms or protocols are typically added in the approaches by compromising disorganized policies or additional components to protect from unauthorized access.Usage control has been considered as the next generation access control model with distinguishing properties of decision continuity. In this paper, we present a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents. The model not only supports complex constraints for pervasive computing, such as services, devices and data types but also provides a mechanism to build rich reuse relationships between models and objects. Finally, comparisons with related works are analysed.

References

  1. M. Weiser, "Hot topics-ubiquitous computing," Computer, Vol. 26, no. 10, pp. 71--72, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. W. Edwards, M. Newman and J. Sedivy, "Building the ubiquitous computing user experience," in CHI '01: CHI '01 extended abstracts on Human factors in computing systems. New York, NY, USA: ACM Press, 2001, pp. 501--502. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. Zhang and M. Parashar, "Context-aware dynamic access control for pervasive applications," in CND'04: Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference. Society for Modeling and Simulation International, 2004, pp. 21--30.Google ScholarGoogle Scholar
  4. J. Seigneur and C. Jensen, "Trust enhanced ubiquitous payment without too much privacy loss," in SAC '04: Proceedings of the 2004 ACM symposium on Applied computing. New York, NY, USA: ACM Press, 2004, pp. 1593--1599. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. Sampemane, P. Naldurg and R. Campbell, "Access control for active spaces," in ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference. Washington, DC, USA: IEEE Computer Society, 2002, p. 343. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. Viswanathan, B. Gill and R. Campbell, "Security architecture in gaia," Champaign, IL, USA, Tech. Rep., 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. JA1-Muhtadi, R. Campbell, A. Kapadia, M. Mickunas and S. Yi, "Routing through the mist: Privacy preserving communication in ubiquitous computing environments," in ICDCS '02: Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02). Washington, DC, USA: IEEE Computer Society, 2002, p. 74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Sandhu, "Role activation hierarchies," in Third ACM Workshop on RoleBased Access Control. ACM Press, October 1998, pp. 33--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. Wang, J. Li, R. Addie, S. Dekeyser and R. Watson, "A framework for role-based group delegation in distributed environment," in Proceedings of the 29th Australasian Computer Science Conference. Australian Computer Society, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Park and R. Sandhu, "Towards usage control models: beyond traditional access control," in Proceedings of the seventh ACM symposium on Access control models and technologies. ACM Press, 2002, pp. 57--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. ISO, "Security frameworks for open systems: Access control framework, ISO/IEC 10181--3," 1996.Google ScholarGoogle Scholar
  12. H. Wedde and M. Lischka, "Role-based access control in ambient and remote space," in SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies. New York, NY, USA: ACM Press, 2004, pp. 21--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Wang, J. Cao and Y. Zhang, "Formal authorization allocation approaches for permission-role assignments using relational algebra operations," in Proceedings of the 14th Australian Database Conference ADC2003, Adelaide, Australia, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H. Wang, Y. Zhang, J. Cao and V. Varadharajan, "Achieving secure and flexible m-services through tickets," IEEE Transactions on Systems, Man, and Cybernetics, Part A, Special issue on M-Services, pp. 697--708, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H. Wang, J. Cao, Y. Zhang, "A flexible payment scheme and its role based access control," IIEEE Transactions on Knowledge and Data Engineering, Vol. 17, no. 3, pp. 425--436, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Goldschlag, M. Reed and P. Syverson, "Onion routing for anonymous and private Internet connections," Communications of the ACM, Vol. 24, no. 2, pp. 39--41, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Jajodia, P. Samarati, V. Subrahmanian and E. Bertino, "A unified framework for enforcing multiple access control policies," in Proceedings of the 1997 ACM SIGMOD international conference on Management of data. ACM Press, 1997, pp. 474--485. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. E. Bertino, S. Castano, E. Ferrari and M. Mesiti, "Controlled access and dissemination of xml documents," in Proceedings of the second international workshop on Web information and data management. ACM Press, 1999, pp. 22--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. E. Damiani, D. Sabrina, S. Paraboschi and P. Samarati, "Fine grained access control for soap e-services," in Proceedings of the tenth international conference on World Wide Web. ACM Press, 2001, pp. 504--513. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Sabrina, "An authorization model for temporal xml documents," in Proceedings of the 2002 ACM symposium on Applied computing. ACM Press, 2002, pp. 1088--1093. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Q. Li and V. Atluri, "Concept-level access control for the semantic web," in Proceedings of the 2003 ACM workshop on XML security. ACM Press, 2003, pp. 94--103. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Ubiquitous computing environments and its usage access control

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Other conferences
                    InfoScale '06: Proceedings of the 1st international conference on Scalable information systems
                    May 2006
                    512 pages
                    ISBN:1595934286
                    DOI:10.1145/1146847

                    Copyright © 2006 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 30 May 2006

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • Article

                    Acceptance Rates

                    InfoScale '06 Paper Acceptance Rate33of91submissions,36%Overall Acceptance Rate33of91submissions,36%

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader