2018 | OriginalPaper | Buchkapitel
Tipp
Weitere Kapitel dieses Buchs durch Wischen aufrufen
Erschienen in:
Intelligent Distributed Computing XI
Since computing devices in IoT tend to have only limited computational resources, to provide enrich context-aware services, e.g., location-aware user assistant services, from IoT environments, such services should be offloaded to be executed on server-sides, including cloud computing platforms. However, there are differences between access control models in context-aware services and cloud computing platforms, where the former needs context-aware access models and the latter widely uses role/subject-based access control models. This paper aims to bridging the models. We present a model for spatially specifying containment relationships of persons, physical entities, spaces, and computers to specify contextual information about the real world. Our approach connects between the world model and services offloaded to cloud computing as an access control mechanism. This paper presents the basic notion of the model and its prototype implementation.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Anzeige
1.
Beigl, M., Zimmer, T., Decker, C.: A location model for communicating and processing of context. Pers. Ubiquit. Comput. (Springer)
6(5–6), 341–357 (2002)
2.
Brumitt, B.L., Meyers, B., Krumm, J., Kern, A., Shafer, S.: Easy living: technologies for intelligent environments. In: International Symposium on Handheld and Ubiquitous Computing, pp. 12–27. Springer (2000)
3.
Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: Proceedings of 6th ACM Symposium on Access Control Models and Technologies (SACMAT’2001), pp. 10–20 (2001)
4.
Ferraiolo, D.F., Barkley, J.F., Kuhn, D.: A role based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur.
2(1), 34–64 (1999)
CrossRef
5.
Georgiadis, C.K., Mavridis, I., Pangalos, G., Thomas, R.K.: Flexible team-based access control using contexts. In: 6th ACM Symposium on Access Control Models and Technologies (SACMAT’01), pp. 21–27 (2001)
6.
Giuri, L., Iglio, P.: Role templates for content-based access control. In: 2nd ACM Workshop on Role Based Access Control (RBAC’97), pp. 153–159 (1997)
7.
Hulsebosch, R.J., Salden, A.H., Bargh, M.S., Ebben, P.W.G., Reitsma. J.: Context sensitive access control. In: 10th ACM Symposium on Access Control Models and Technologies (SACMAT ’05), pp. 111–119 (2005)
8.
Leonhardt, U., Magee, J.: Towards a general location service for mobile environments. In: IEEE Workshop on Services in Distributed and Networked Environments, pp. 43–50, IEEE Computer Society (1996)
9.
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput.
29 (1996)
10.
Satoh, I.: A location model for pervasive computing environments. In: Proceedings of IEEE 3rd International Conference on Pervasive Computing and Communications (PerCom’05), pp, 215–224. IEEE Computer Society (2005)
11.
Satoh, I.: Mobile agents. In: Handbook of Ambient Intelligence and Smart Environments, pp. 771–791. Springer (2010)
12.
Tandler, P.: The BEACH application model and software framework for synchronous collaboration in ubiquitous computing environments. J. Syst. Softw.
69(3), 267–296 (2004)
CrossRef
13.
Thomas, R.K.: Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: 3nd ACM workshop on Role-based Access Control, pp. 13–19 (1997)
- Titel
- Context-Aware Access Control Model for Services Provided from Cloud Computing
- DOI
- https://doi.org/10.1007/978-3-319-66379-1_25
- Autor:
-
Ichiro Satoh
- Sequenznummer
- 25