Access control management for ubiquitous computing

11 years 8 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. This ubiquitous computing poses new security challenges while the information can be accessed at anywhere and anytime because it may be applied by criminal users. Additionally, the information may contain private information that cannot be shared by all user communities. Several approaches are developed to protect information for pervasive environments agaist malicious users. However, ad-hoc mechanisms or protocols are typically added in the approaches by compromising disorganized policies or additional components to protect from unauthorized access. In this paper, we present a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents. The model not only supports complex constraints for pervasive comput...
Hua Wang, Yanchun Zhang, Jinli Cao
Added 10 Dec 2010
Updated 10 Dec 2010
Type Journal
Year 2008
Where FGCS
Authors Hua Wang, Yanchun Zhang, Jinli Cao
Comments (0)