CA-UCON: a Context-Aware Usage Control Model

被引:0
|
作者
Almutairi, Abulgader [1 ]
Siewe, Francois [1 ]
机构
[1] De Montfort Univ, Software Technol Res Lab, Leicester LE1 9BH, Leics, England
关键词
Pervasive computing; context-aware; usage control; adaptive system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Usage CONtrol (UCON) model is the latest major enhancement of the traditional access control models which enables mutability of subject and object attributes, and continuity of control on usage of resources. In UCON, access permission decision is based on three factors: authorisations, obligations and conditions. While authorisations and obligations are requirements that must be fulfilled by the subject and the object, conditions are subject and object independent requirements that must be satisfied by the environment. As a consequence, access permission may be revoked (and the access stopped) as a result of changes in the environment regardless of whether the authorisations and obligations requirements are met. This constitutes a major shortcoming of the UCON model in pervasive computing systems which constantly strive to adapt to environmental changes so as to minimise disruptions to the user. To overcome this limitation, this paper proposes a Context-Aware Usage CONtrol (CA-UCON) model which extends the traditional UCON model to enable adaptation to environmental changes in the aim of preserving continuity of access. When the authorisations and obligations requirements are met by the subject and the object, and the conditions requirements fail due to changes in the environment or the system context, CA-UCON model triggers specific actions to adapt to the new situation. Besides the data protection, CA-UCON model so enhances the quality of services, striving to keep explicit interactions with the user at a minimum.
引用
收藏
页码:38 / 43
页数:6
相关论文
共 50 条
  • [21] A MODEL OF CONTEXT-AWARE AGENT ARCHITECTURE
    Stoyanov, Stanimir
    Valkanov, Vladimir
    Popchev, Ivan
    Stoyanova-Doycheva, Asya
    Doychev, Emil
    COMPTES RENDUS DE L ACADEMIE BULGARE DES SCIENCES, 2014, 67 (04): : 487 - 496
  • [22] A Context-Aware Model for Smart Space
    Tian, Xianhu
    Xie, Yong
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 845 - 850
  • [23] A Context-aware supplier selection model
    Razzazi, Mohammadreza
    Bayat, Maryam
    World Academy of Science, Engineering and Technology, 2009, 38 : 736 - 742
  • [24] A transaction model for context-aware applications
    Chen, Shaxun
    Ge, Jidong
    Tao, Xianping
    Lu, Jian
    ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2007, 4459 : 252 - +
  • [25] Context-aware Authorization Model for Smartphones
    Miraoui, Moeiz
    2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, : 1053 - 1057
  • [26] Context-Aware Usage-Based Grid Authorization Framework
    CUI Yongquan
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1736 - 1740
  • [27] Learning sensors usage patterns in mobile context-aware systems
    Bobek, Szymon
    Porzycki, Krzysztof
    Nalepa, Grzegorz J.
    2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 993 - 998
  • [28] Attribute analysis of usage control (UCON)
    Li, ZD
    Ye, XJ
    Proceedings of the 11th Joint International Computer Conference, 2005, : 59 - 64
  • [29] A Policy Model and Framework for Context-Aware Access Control to Information Resources
    Kayes, A. S. M.
    Han, Jun
    Rahayu, Wenny
    Dillon, Tharam
    Islam, Md. Saiful
    Colman, Alan
    COMPUTER JOURNAL, 2019, 62 (05): : 670 - 705
  • [30] A Study on Automated Context-aware Access Control Model Using Ontology
    Jang, Bokman
    Jang, Hyokyung
    Choi, Euiin
    ADVANCED COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2010, 74 : 179 - 186