Context-aware role-based access control in pervasive computing systems

Devdatta Kulkarni, Anand R Tripathi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

174 Scopus citations

Abstract

In this paper we present a context-aware RBAC (CA-RBAC) model for pervasive computing applications. The design of this model has been guided by the context-based access control requirements of such applications. These requirements are related to users' memberships in roles, permission executions by role members, and context-based dynamic integration of services in the environment with an application. Context information is used in role admission policies, in policies related to permission executions by role members, and in policies related to accessing of dynamically interfaced services by role members. The dynamic nature of context information requires model-level support for revocations of role memberships and permission activations when certain context conditions fail to hold. Based on this model we present a programming framework for building context-aware applications, providing mechanisms for specifying and enforcing context-based access control requirements.

Original languageEnglish (US)
Title of host publicationSACMAT'08 - Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
Pages113-122
Number of pages10
DOIs
StatePublished - 2008
Event13th ACM Symposium on Access Control Models and Technologies, SACMAT'08 - Estes Park, CO, United States
Duration: Jun 11 2008Jun 13 2008

Publication series

NameProceedings of ACM Symposium on Access Control Models and Technologies, SACMAT

Other

Other13th ACM Symposium on Access Control Models and Technologies, SACMAT'08
Country/TerritoryUnited States
CityEstes Park, CO
Period6/11/086/13/08

Keywords

  • Access control
  • Context-aware computing
  • Context-based
  • Pervasive computing
  • RBAC

Fingerprint

Dive into the research topics of 'Context-aware role-based access control in pervasive computing systems'. Together they form a unique fingerprint.

Cite this