Skip to main content

A Semantic Context-Aware Access Control in Pervasive Environments

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3981))

Included in the following conference series:

Abstract

Increasing trends in pervasive computing demonstrate a requirement for context awareness. The security problem has also become a key issue with context awareness. Access control should execute its decisions by capturing security-relevant context, such as time, location, user activity, and other environmental information available when the access requests arrive. In previous context-aware access control systems, a query issued by an authorized user could not be answered when the context specified in access control policy do not exactly match that specified in the query, even though both are semantically related. In this paper, Semantic Context-aware Access Control (SCAC), is proposed, to solve the problem mentioned prior. The proposed SCAC system takes contexts and its ontologies from context middleware and subsequently arranges contexts according to the abstraction level, to build context hierarchies. Using context hierarchies and reasoning rules extracted from the context ontologies, SCAC can overcome the semantic gap between contexts specified in the policy and contexts collected from the dynamic context sources in pervasive environments.

This research was supported in part by university IT research center project (ITRC) funded by the Korean Ministry of Information and Communication and by Korea Science & Engineering Foundation (R01-2004-000-10755-0).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser, M.: Hot Topics: Ubiquitous Computing. In IEEE the computer (1993)

    Google Scholar 

  2. Bellavista, P., Corradi, A., Stefanelli, C.: The Ubiquitous Provisioning of Internet Services to Portable Devices. IEEE Pervasive Computing 1(3) (2002)

    Google Scholar 

  3. Moyer, M.J., Covington, M.J., Ahamad, M.: Generalized role-based access control for securing future applications. In: NISSC 2000 23rd National Information Systems Security Conference (2000)

    Google Scholar 

  4. Covington, M.J., Srinivasan, S., Dey, A., Ahamad, M., Long, W., Abowd, G.: Securing context-aware applications using environment roles. In: SACMAT 2001 (2001)

    Google Scholar 

  5. Adam, N.R., Atluri, V.: A Content-based Authorization Model for Digital Libraries. IEEE Transactions on knowledge and data engineering, 14(2) (2002)

    Google Scholar 

  6. Kumar, A., Karnik, N., Chafle, G.: Context Sensitivity in Role-based Access Control. Operating Systems Review. IBM Journal 36(3) (2002)

    Google Scholar 

  7. Li Q., Atluri, V.: Concept-level Access Control for the Semantic Web. In: ACM Workshop on XML Security (2003)

    Google Scholar 

  8. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role Based Access Control Models. IEEE Computer, 29(2) (February 1996)

    Google Scholar 

  9. Sandhu, R., Samarati, P.: Access control: principles and practice. IEEE Communication Magazine, 32 (1994)

    Google Scholar 

  10. Sandhu, R., Ferraiolo, D., Kuhm, R.: The NIST Model for Role-Based Access Control: Towards A Unified Standard. In: Proceedings of the fifth ACM workshop on Role-based access control (2000)

    Google Scholar 

  11. Ranganathan, A., Campbell, R.H.: An Infrastructure for context-awareness based on first-order logic. In Personal and Ubiquitous Computing, 7(6) (2003)

    Google Scholar 

  12. Wang, X.H., Xhang, D.Q., Gu, T., Pung, H.K.: Ontology Based Context Modeling and Reasoning using OWL. In: PerCom 2004 Annual Conference on Pervasive computing and Communications Workshop (2004)

    Google Scholar 

  13. Bellifemine, F., Poggi, A., Rimassa, G.: Developing multi agent systems with a FIPA-compliant agent framework. In: Software - Practice & Experience. John Wiley & Sons, Ltd., Chichester (2001)

    Google Scholar 

  14. Haarslev, V., Möller, R.: Racer: A Core Inference Engine for the Semantic Web. In: Proceedings of the 2nd International Workshop on Evaluation of Ontology-based Tools (EON 2003), located at the 2nd International Semantic Web Conference ISWC 2003, Sanibel Island, Florida, USA, October 20 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ko, H.J., Won, D.H., Shin, D.R., Choo, H.S., Kim, U.M. (2006). A Semantic Context-Aware Access Control in Pervasive Environments. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3981. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751588_18

Download citation

  • DOI: https://doi.org/10.1007/11751588_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34072-0

  • Online ISBN: 978-3-540-34074-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics