Role-based Access Control Model in Home Network Environments

被引:0
|
作者
Kim, Do-Woo [1 ]
Kim, Geon Woo [1 ]
Lee, Jun-Ho [1 ]
Han, Jong-Wook [1 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305606, South Korea
关键词
Home Network; Access Control; RBAC; Security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The home in these days has not one computer connected to the Internet but rather a network of many devices within the home, and that network might be connected to the Internet. In such an environment, the potential for attacks is greatly increased. The general security technology can not apply because of the use of various wired and wireless network, middleware and protocol in digital home environment and a restricted system resource of home information appliances. To offer secure home services home network environments have need of access control for various home devices and information when users want to access. Therefore home network access control for user authorization is a very important issue. In this paper we propose access control model using RBAC in home network environments to provide home users with secure home services.
引用
收藏
页码:97 / 99
页数:3
相关论文
共 50 条
  • [41] An Extended Role-Based Access Control Model for CSCW Systems
    Chen, Bing
    MACHINING AND ADVANCED MANUFACTURING TECHNOLOGY X, 2010, 431-432 : 577 - 582
  • [42] Integrating Role-Based Access Control Model with Web Server
    Li, Celia
    Yang, Cungang
    Qin, Ling
    Yang, Yiguang
    2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 615 - 618
  • [43] Enterprise model as a basis of administration on role-based access control
    Oh, S
    Park, S
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON COOPERATIVE DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2000, : 150 - 158
  • [44] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [45] AMTRAC: An administrative model for temporal role-based access control
    Sharma, Manisha
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    COMPUTERS & SECURITY, 2013, 39 : 201 - 218
  • [46] Consistency maintenance for constraint in role-based access control model
    韩伟力
    陈刚
    董金祥
    尹建伟
    Journal of Zhejiang University Science, 2002, (03) : 43 - 48
  • [47] A Purpose-Involved Role-Based Access Control Model
    Wang, Yingjie
    Zhou, Zhihong
    Li, Jianhua
    FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2013), 2014, 277 : 1119 - 1131
  • [48] A privacy enhanced role-based access control model for enterprises
    Yang, CG
    Zhang, CN
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1012 - 1021
  • [49] Centralized Role-Based Access Control for Federated Multi-Domain Environments
    MUDAR Sarem
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1688 - 1692
  • [50] An Extended Role-Based Access Control Model for Delegating Obligations
    Ben-Ghorbel-Talbi, Meriam
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Bouhoula, Adel
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2009, 5695 : 127 - +