uiH-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment (original) (raw)
Abstract
In this paper, we propose a _ui_H-PMAC (ubi-intelligent Home – Privilege Management Access Control) model which is suitable to access control of ubiquitous intelligent environment. The model considers the temporary limit conditions as access control of home device or user location information considering the characteristics of members who could limit the use of resource. In addition, the model provides authentication policy which authenticates not only devices but also domains and access control policy which considers inheritance of role. Finally, the model can be applied various and scalable access control policies which are suitable to the characteristics of intelligent digital environment as considering the user location information as a temporary limit condition.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
- Weiser, M.: The Computer for the 21st Century, pp. 94–104. Scientific American (1991)
Google Scholar - Park, J.H., Park, H.-S., Lee, S., Jun-Choi: Intelligent Multimedia Service System Based on Context Awareness in Smart Home. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3681, pp. 1146–1152. Springer, Heidelberg (2005)
Chapter Google Scholar - Satya, M.: IEEE Pervasive Computing Magazine, http://www.computer.org/pervasive
- Park, J.H., Jun-Choi, Lee, S., Park, H.-U., Lee, D.-G.: User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3801, pp. 313–320. Springer, Heidelberg (2005)
Chapter Google Scholar - Stajano, F.: Security for Ubiquitous Computing. Wiley, Chichester (2002)
Book Google Scholar - Ferraiolo, D.F., Kuhn, D.R.: Role-based access controls. In: 15th NIST-NCSC National Computer Security Conference, Baltimore, pp. 554–563 (1992)
Google Scholar - Tassey, G., Gallaher, M.P., O’Connor, A.C., Kropp, B.: The Economic Impact of Role-Based Access Control, NIST Planning Report 02-1 (2002)
Google Scholar - Oh, S., Park, S.: Task-Role Based Access Control (T-RBAC): An Improved Access Control Model for Enterprise Environment. In: Ibrahim, M., Küng, J., Revell, N. (eds.) DEXA 2000. LNCS, vol. 1873, Springer, Heidelberg (2000)
Chapter Google Scholar - Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.: A Generalized Temporal Role-Based Access Control Model. IEEE Transactions On Knowledge And Data Engineering 17(1) (2005)
Google Scholar - Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A Temporal Role-Based Access Control Model. ACM Transaction on Information and System Security (TISSEC) 4(3), 191–233 (2001)
Article Google Scholar
Author information
Authors and Affiliations
- Center for Information Security Technologies, Korea University, 5-Ka, Anam-Dong, Sungbuk-Gu, Seoul, Korea
Jong Hyuk Park & Sangjin Lee - DigiCAPs Co., Ltd., Jinjoo Bldg., Bangbae-Dong, Seocho-Gu, Seoul, Korea
Byoung-Soo Koh - Division of Computer Engineering, Daejon University, Dong-Gu, Daejon, Korea
Jae-Hyuk Jang
Authors
- Jong Hyuk Park
- Sangjin Lee
- Byoung-Soo Koh
- Jae-Hyuk Jang
Editor information
Editors and Affiliations
- School of Design, Engineering and Computing, Bournemouth University, UK
Bogdan Gabrys - Centre for SMART Systems, School of Environment and Technology, University of Brighton, BN2 4GJ, Brighton, UK
Robert J. Howlett - School of Electrical and Information Engineering, Knowledge Based Intelligent Engineering Systems Centre, University of South Australia, SA, 5095, Mawson Lakes, Australia
Lakhmi C. Jain
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, J.H., Lee, S., Koh, BS., Jang, JH. (2006). _ui_H-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4252. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893004\_99
Download citation
- .RIS
- .ENW
- .BIB
- DOI: https://doi.org/10.1007/11893004\_99
- Publisher Name: Springer, Berlin, Heidelberg
- Print ISBN: 978-3-540-46537-9
- Online ISBN: 978-3-540-46539-3
- eBook Packages: Computer ScienceComputer Science (R0)Springer Nature Proceedings Computer Science
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.