|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
uT-RBAC: Ubiquitous Role-Based Access Control Model
Song-hwa CHAE Wonil KIM Dong-Kyoo KIM
Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Vol.E89-A
No.1
pp.238-239 Publication Date: 2006/01/01 Online ISSN: 1745-1337
DOI: 10.1093/ietfec/e89-a.1.238 Print ISSN: 0916-8508 Type of Manuscript: Special Section LETTER (Special Section on Cryptography and Information Security) Category: Access Control Keyword: access control, RBAC, ubiquitous computing,
Full Text: PDF(86.9KB)>>
Summary:
In ubiquitous environment that users access resource anytime and anywhere, access control model should consider user's location information. The proposed uT-RBAC includes the location information for user's least privilege. It also supports time related information, which enables the access control model to accommodate various ubiquitous environments. The proposed uT-RBAC can be dynamically applied to various ubiquitous computing envrionment.
|
|