Applied Technology for Usage Control Model in Pervasive Computing

Article Preview

Abstract:

During the applications development of pervasive computing, access control is new demands advanced by pervasive computing. Usage Control models are used to solve access control. This paper uses these models to solve problem of access control in Pervasive Computing environment and provides a model of Usage Control in Pervasive Computing (UCONpc), context information and delegation rights satisfy the features of access control in pervasive computing system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

605-608

Citation:

Online since:

January 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jianli He, Rong Chen, Kangqin Ma. Self-adaptive Middleware in Ubiquitous Computing Environments[J]. Computer Science, 2009, 36(7): 103-106.

Google Scholar

[2] Guangyou Xu, Yuanchun Shi. Pervasive/Ubiquitoas Computing[J]. Chinese Journal of Computers, 2003, 26(9): 1042-1050.

Google Scholar

[3] Yan Xin, Changyuan Luo. Context-based RBAC model in pervasive computing[J]. Computer Engineering and Design, 2010, 31(8): 1693-1697.

Google Scholar

[4] Wenyang Dou, Xiaoming Wang, Lichen Zhang. New Fuzzy Role-based Access Control Model for Ubiquitous Computing[J]. Computer Science, 2010, 37(9): 63-67.

Google Scholar

[5] Park J, SansHu R The UCONABC usage control model[J. ] ACM Transactions on Information and Systems Security, 2004, 7(1): 128-174.

Google Scholar

[6] WuHaiying. Based on Context Pervasive Computing Usage Control Model [J]. Journal of Computer Application, 2012, 32(2): 489-492.

Google Scholar

[7] Zhaowei Hu, Ruifang Jin, Wanjun Yu. Logical definition of usage control authorization model[J]. Journal of Computer Application, 2009, 29(9): 2360-2374.

DOI: 10.3724/sp.j.1087.2009.02360

Google Scholar