Role-based Access Control Model in Home Network Environments

被引:0
|
作者
Kim, Do-Woo [1 ]
Kim, Geon Woo [1 ]
Lee, Jun-Ho [1 ]
Han, Jong-Wook [1 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305606, South Korea
关键词
Home Network; Access Control; RBAC; Security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The home in these days has not one computer connected to the Internet but rather a network of many devices within the home, and that network might be connected to the Internet. In such an environment, the potential for attacks is greatly increased. The general security technology can not apply because of the use of various wired and wireless network, middleware and protocol in digital home environment and a restricted system resource of home information appliances. To offer secure home services home network environments have need of access control for various home devices and information when users want to access. Therefore home network access control for user authorization is a very important issue. In this paper we propose access control model using RBAC in home network environments to provide home users with secure home services.
引用
收藏
页码:97 / 99
页数:3
相关论文
共 50 条
  • [21] Role-based Access Control Model for Multicast in MANET
    Mu Haibing
    Zhang Changlun
    Zeng Ping
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 816 - 819
  • [22] dRBAC: Distributed role-based access control for dynamic coalition environments
    Freudenthal, E
    Pesin, T
    Port, L
    Keenan, E
    Karamcheti, V
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 411 - 420
  • [23] A Context-Sensitive Dynamic Role-Based Access Control Model for Pervasive Computing Environments
    Emami, Sareh Sadat
    Zokaei, Saadan
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 2 (01): : 47 - 66
  • [24] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [25] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [26] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [27] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [28] Role hierarchy model for role-based access control and its application
    Zhong, Hua
    Feng, Yulin
    Jiang, Hongan
    2000, (11):
  • [29] Role-based access control hierarchy model in distributed system
    Hong, Fan
    Wu, Min
    2003, Huazhong University of Science and Technology (31):
  • [30] Practical Role-Based Access Control
    Galante, Victoria
    INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73