User-Centric Adaptive Access Control and Resource Configuration for Ubiquitous Computing Environments
نویسندگان
چکیده
Provision of adaptive access control is key to allowing users harness the full potential of ubiquitous computing environments. In this paper, we introduce the M-Zones Access Control (MAC) process, which provides user-centric attribute-based access control, together with automatic reconfiguration of resources in response to the changes in the set of users physically present in the environment. User control is realised via user-specified policies, which are analysed in tandem with system policies and policies of other users, whenever events occur that require policy decisions and associated configuration operations. In such a system users’ policies may habitually conflict with system policies, or indeed other users’ policies; thus, policy conflict detection and resolution is a critical issue. To address this we describe a conflict detection/resolution method based on a policy precedence scheme. To illustrate the operation of the MAC process and its conflict detection/resolution method, we discuss its realisation in a test bed emulating an office-based ubiquitous computing environment.
منابع مشابه
A context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملAgent-based Intelligent Middleware for User-Centric Services in Ubiquitous Computing Environments
With the emergence of the ubiquitous computing era, it has become increasingly important for a middleware that fully exploits Human Computer Interaction (HCI)friendly characteristics in order to support user-centric services. Many studies about HCIfriendly middleware designed to support user-centric services have been performed. However, most of the existing research focuses on functional impro...
متن کاملAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملUser-defined Scenarios in Ubiquitous Environments: Creation, Execution Control and Sharing
Ubiquitous computing provides a dynamic access to different functionalities of networkable electronic devices. Whereas basic services have limited use, predefined complex services cannot encompass every end-user’s needs nor be adapted to a set of services that are dynamically discovered in an open environment. Alternatively, users need to be provided with means to express their requirements, ch...
متن کاملCOSMOS: A Context-Centric Access Control Middleware for Mobile Environments
User/terminal mobility during service provisioning and high heterogeneity of wireless portable devices identify novel challenges for service delivery in ubiquitous pervasive environments. An emerging architecture solution in the wireless Internet is to have middleware components (mobile proxies) over the fixed network that follow the movements and act on behalf of the limited wireless clients. ...
متن کامل