The Application of the Context-Aware Access Control Model

被引:0
|
作者
Zhang, Chao [1 ]
Jin, Zhengping [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
access control; context-aware; RFID; monitoring system;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Traditional access control model in building safety regulation is not flexible enough in some scenarios, especially in emergency events, which may lead to the alarm events not promptly treated. In order to solve this problem, we design a context-aware access control model which uses RFID technology to identify the user's identity information and the environmental contexts, then we apply it to the intelligent building monitoring system. The application of the new model can bring more flexibility and security.
引用
收藏
页码:2670 / 2674
页数:5
相关论文
共 50 条
  • [31] A Context-Aware Semantic-Based Access Control Model for Mobile Web Services
    Shen, HaiBo
    Cheng, Yu
    ADVANCED RESEARCH ON COMPUTER SCIENCE AND INFORMATION ENGINEERING, 2011, 153 : 132 - 139
  • [32] A Semantic Policy Framework for Context-Aware Access Control Applications
    Kayes, A. S. M.
    Han, Jun
    Colman, Alan
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 753 - 762
  • [33] A trust-based context-aware access control model for Web-services
    Bhatti, R
    Bertino, E
    Ghafoor, A
    IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2004, : 184 - 191
  • [34] A Trust-Based Context-Aware Access Control Model for Web-Services
    Rafae Bhatti
    Elisa Bertino
    Arif Ghafoor
    Distributed and Parallel Databases, 2005, 18 : 83 - 105
  • [35] Context-aware environment-role-based access control model for web services
    Wang, Chun-Dong
    Li, Ting
    Feng, Li-Chun
    MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 288 - 293
  • [36] iPri: Context-Aware Access Control and Privacy Policy Recommendation
    Li, Guoyun
    Zhang, Yaozhi
    Yu, Xianqi
    Sun, Yuqing
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 370 - 370
  • [37] Authentication and access control agent framework for context-aware services
    Nishiki, K
    Tanaka, E
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 200 - 203
  • [38] Context-Aware Access Control in Novel Automotive HMI Systems
    Gansel, Simon
    Schnitzer, Stephan
    Gilbeau-Hammoud, Ahmad
    Friesen, Viktor
    Duerr, Frank
    Rothermel, Kurt
    Maihoefer, Christian
    Kraemer, Ulrich
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 118 - 138
  • [39] A trust-based context-aware access control model for Web-services
    Bhatti, R
    Bertino, E
    Ghafoor, A
    DISTRIBUTED AND PARALLEL DATABASES, 2005, 18 (01) : 83 - 105
  • [40] Modular Context-Aware Access Control for Medical Sensor Networks
    Garcia-Morchon, Oscar
    Wehrle, Klaus
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 129 - 138