uT-RBAC: Ubiquitous Role-Based Access Control Model

Song-hwa CHAE  Wonil KIM  Dong-Kyoo KIM  

Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E89-A   No.1   pp.238-239
Publication Date: 2006/01/01
Online ISSN: 1745-1337
DOI: 10.1093/ietfec/e89-a.1.238
Print ISSN: 0916-8508
Type of Manuscript: Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Access Control
Keyword: 
access control,  RBAC,  ubiquitous computing,  

Full Text: PDF(86.9KB)>>
Buy this Article




Summary: 
In ubiquitous environment that users access resource anytime and anywhere, access control model should consider user's location information. The proposed uT-RBAC includes the location information for user's least privilege. It also supports time related information, which enables the access control model to accommodate various ubiquitous environments. The proposed uT-RBAC can be dynamically applied to various ubiquitous computing envrionment.