Controlling access to pervasive information in the “Solar” system
نویسندگان
چکیده
Pervasive-computing infrastructures necessarily collect a lot of context information to disseminate to their context-aware applications. Due to the personal or proprietary nature of much of this context information, however, the infrastructure must limit access to context information to authorized persons. In this paper we propose a new access-control mechanism for event-based contextdistribution infrastructures. The core of our approach is based on a conservative information-flow model of access control, but users may express discretionary relaxation of the resulting access-control list (ACL) by specifying relaxation functions. This combination of automatic ACL derivation and user-specified ACL relaxation allows access control to be determined and enforced in a decentralized, distributed system with no central administrator or central policy maker. It also allows users to express their personal balance between functionality and privacy. Finally, our infrastructure allows access-control policies to depend on contextsensitive roles, allowing great flexibility. We describe our approach in terms of a specific context-dissemination framework, the Solar system, although the same principles would apply to systems with similar properties.
منابع مشابه
A semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملSecurity Solutions for Pervasive Healthcare
Pervasive healthcare systems use pervasive computing technologies, e.g., wearable medical sensors with wireless interconnects, to increase the modalities and spatiotemporal dimensions in which healthcare services can be provided for improving patient outcomes. Security is very important in pervasive healthcare systems to protect sensitive health information that it collects and manages; therefo...
متن کاملDesign of Maximum Power Point Tracking in Solar Array Systems Using Fuzzy Controllers
In recent year's renewable energy sources have become a useful alternative for the power generation. The power of photovoltaic is nonlinear function of its voltage and current. It is necessary to maintain the operation point of photovoltaic in order to get the maximum power point (MPP) in various solar intensity. Fuzzy logic controller has advantage in handling non-linear system. Maximum power ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002