A semantic authorization model for pervasive healthcare

被引:7
|
作者
Li, Zang [1 ]
Chu, Chao-Hsien [1 ,2 ]
Yao, Wen [1 ]
机构
[1] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
[2] Singapore Management Univ, Sch Informat Syst, Singapore 179802, Singapore
关键词
Semantic access control; Authorization; RFID; Ontology; Pervasive healthcare; ACCESS-CONTROL;
D O I
10.1016/j.jnca.2013.06.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate how to secure sharing of complex data objects among pervasive information systems. To address the challenges posed by heterogeneous data sources, complex objects and context dynamics, we propose an advanced authorization model that supports specifying and enforcing authorizations in flexible and efficient ways. The model employs ontology and semantic web technologies to conceptualize data and explicitly express the relationships among concepts and instances involved in information sharing. Authorizations can be specified at different levels of the predefined concept hierarchies and be propagated to lower-levels. A novel decision propagation model is proposed to enable fast evaluation and updating of concept-level access decisions. To resolve conflicts among policies, we model a policy set as a semilattice, upon which a binary operation is defined to adapt to various requirements. Moreover, enabled by ontology reasoning tools, a flexible specification approach of authorization, namely rule-based policy generation, is developed to encode context dynamics, making the authorization enforcement adaptive to contexts. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:76 / 87
页数:12
相关论文
共 50 条
  • [41] Information Architecture in Pervasive Healthcare
    Liu, Kecheng
    PROCEEDINGS OF 2ND CONFERENCE ON LOGISTICS, INFORMATICS AND SERVICE SCIENCE (LISS 2012), VOLS 1 AND 2, 2013, : 7 - 8
  • [42] Special Issue on Pervasive Healthcare
    Delmastro, Franca
    Cook, Diane J.
    Skubic, Marjorie
    Lukowicz, Paul
    PERVASIVE AND MOBILE COMPUTING, 2012, 8 (06) : 811 - 812
  • [43] Towards Ubiquitous and Pervasive Healthcare
    Szymanski, Jan
    Chaczko, Zenon
    Rodanski, Ben
    ADVANCED METHODS AND APPLICATIONS IN COMPUTATIONAL INTELLIGENCE, 2014, 6 : 387 - 404
  • [44] Trust and authorization in pervasive B2E scenarios
    Bussard, L
    Roudier, Y
    Kilian-Kehr, R
    Crosta, S
    INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 295 - 309
  • [45] NFC For Pervasive Healthcare Monitoring
    Prabhakar, T., V
    Mysore, Ujwal
    Saini, Uday
    Vinoy, K. J.
    Amruthur, Bharadwaj
    2015 28TH INTERNATIONAL CONFERENCE ON VLSI DESIGN (VLSID), 2015, : 75 - 80
  • [46] Wireless Technology for Pervasive Healthcare
    Giancarlo Fortino
    Xu Li
    Xiaodong Lin
    Oscar Mayora
    Enrico Natalizio
    Mehmet Rasit Yuce
    Mobile Networks and Applications, 2014, 19 : 273 - 275
  • [47] Pervasive Healthcare Monitoring System
    Nava Perez, Mario
    Alvarez Mata, Francisco J.
    Zamudio Rodriguez, Victor M.
    Zhang, Shumei
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1712 - 1716
  • [48] Analysing Ballistocardiography for Pervasive Healthcare
    Hytonen, Roni
    Tshala, Alison
    Schreier, Jan
    Holopainen, Melissa
    Forsman, Aada
    Oksanen, Minna
    Findling, Rainhard Dieter
    Le Ngu Nguyen
    Sigg, Stephan
    Jaehne-Raden, Nico
    2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, : 86 - 91
  • [49] A risk evaluation approach for authorization decisions in social pervasive applications
    Ali-Eldin, Amr
    van den Berg, Jan
    Ali, Hesham A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2016, 55 : 59 - 72
  • [50] A UPnP extension for enabling user authentication and authorization in pervasive systems
    Sales T.
    Sales L.
    Almeida H.
    Perkusich A.
    Journal of the Brazilian Computer Society, 2010, 16 (04) : 261 - 277