2010 14th Panhellenic Conference on Informatics 2010
DOI: 10.1109/pci.2010.45
|View full text |Cite
|
Sign up to set email alerts
|

Towards Differentiated Utilization of Attribute Mutability for Access Control in Ubiquitous Computing

Abstract: The operational characteristics of ubiquitous computing environments (UbiCom) generate new access control requirements which existing classical access control models fail to support efficiently. However, the Usage Control (UCON) family of models introduces components and mechanisms that seem to be able to partially match the specific requirements imposed by UbiCom environments. In this paper, an evaluation of current access control models based on a brief study of UbiCom access control requirements is presente… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 30 publications
(36 reference statements)
0
4
0
Order By: Relevance
“…the identity, to alwayschanging attributes, e.g. time [1]. In order to support complicated operations of modern computing systems, it is required for actions to be associated also with attributes.…”
Section: Elementsmentioning
confidence: 99%
See 1 more Smart Citation
“…the identity, to alwayschanging attributes, e.g. time [1]. In order to support complicated operations of modern computing systems, it is required for actions to be associated also with attributes.…”
Section: Elementsmentioning
confidence: 99%
“…Despite Usage CONtrol's (UCON) [3] virtues, supporting complex usage scenarios of modern computing environments is a challenging procedure [4,1]. Such a complexity usually results in involving a large number of entities and in utilizing multi party contextual information during the decision making process of a particular usage.…”
Section: Introductionmentioning
confidence: 99%
“…The following access control requirements have been resulted from an analysis of the ODCE characteristics through the application of different scenarios as presented in (Damiani et al, 2005;Grompanopoulos and Mavridis, 2010;Thomas and Sandhu, 2004).…”
Section: Access Control Requirementsmentioning
confidence: 99%
“…This work has appeared in varying forms of conferences (see appendix B). Particularly, a set of new access control requirements were examined in (Grompanopoulos and Mavridis, 2010). Our proposed usage control model and critiques on existing approaches were presented in (Grompanopoulos and Mavridis, 2012a,b;Grompanopoulos et al, 2013).…”
Section: Closing Remarksmentioning
confidence: 99%