Filters








11,854 Hits in 4.7 sec

Incorporating semantics-based search and policy-based access control mechanism in context service delivery

M. Riaz, Saad Liaquat Kiani, Sungyoung Lee, Young-Koo Lee
2005 Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05)  
Semantics-based attributes are used for service registration and lookup. Privacy is maintained by incorporating policy based access control mechanisms in the service delivery modules. 1  ...  Due to the diversity, magnitude and nature of the contextual information, a context-based service delivery mechanism is required which can not only identify the most appropriately matching services for  ...  Architecture The major concerns, in order to define an access control mechanism suitable for pervasive environments, are: policies need to be dynamic in nature; the granularity of control to information  ... 
doi:10.1109/icis.2005.74 dblp:conf/ACISicis/RiazKLL05 fatcat:fy7ubq4pcvb6rjgdpptggy5jeq

A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments [chapter]

Alessandra Toninelli, Rebecca Montanari, Lalana Kagal, Ora Lassila
2006 Lecture Notes in Computer Science  
Access control policies cannot be defined based on entity's identities/roles, as in traditional access control solutions, or be specified a priori to face any operative run time condition, but require  ...  visibility and to enable dynamic adaptation of policies depending on context changes, and semantic technologies for context/policy specification to allow high-level description and reasoning about context  ...  In order to properly control access to resources, we claim the need for a more general and comprehensive approach that exploits not only identity and role information but also other contextual information  ... 
doi:10.1007/11926078_34 fatcat:uucmpzpwpjekffvjz5dbrttzmm

Towards a Context Aware Modeling of Trust and Access Control Based on the User Behavior and Capabilities [chapter]

Abdallah Mhamed, Meriem Zerkouk, Anas El Husseini, Belhadri Messabih, Bachar El Hassan
2013 Lecture Notes in Computer Science  
This paper shows our approach to model both trust and access control based on the user behavior and capabilities which can be derived from the sensed data.  ...  By using the huge and various contextual data issued from the sensors, our objective is to provide a security framework suitable for dependant people.  ...  Contextual access control For pervasive systems, the access control is handled by the development of context aware based access control models which rely on context data to assign the permission to the  ... 
doi:10.1007/978-3-642-39470-6_9 fatcat:552mcqjepjdvrjx5za4vaj4ive

A User Profile Based Access Control Model and Architecture

Meriem Zerkouk, Abdallah Mhamed, Belhadri Messabih
2013 International Journal of Computer Networks & Communications  
in order to grant a service using any assistive device within intelligent environment. the design of our model is an ontology-learning and evolving security policy for predicting the future actions of  ...  This requires rich semantics using ontology modeling for the management of services provided to dependant people.  ...  Service provision is handled by the development of context aware based access control models for pervasive systems.  ... 
doi:10.5121/ijcnc.2013.5112 fatcat:dci2p3a4jbddxdpas4e2n4c4vq

A Policy Model and Framework for Context-Aware Access Control to Information Resources [article]

A. S. M. Kayes, Jun Han, Wenny Rahayu, Md. Saiful Islam, Alan Colman
2017 arXiv   pre-print
Towards this end, this paper introduces a policy framework for context-aware access control (CAAC) applications that extends the role-based access control model with both dynamic associations of user-role  ...  We first present a formal model of CAAC policies for our framework. Using this model, we then introduce an ontology-based approach and a software prototype for modelling and enforcing CAAC policies.  ...  As such kinds of dynamic attributes (contextual conditions) need to be integrated into the basic role-based access control approach, some important issues arise to realize flexible and dynamic access control  ... 
arXiv:1703.02162v1 fatcat:ovx53qx4mnawjooi6mlm6heugi

Put the User in Control: Ontology-Driven Meta-level Interaction for Pervasive Environments

Geert Vanderhulst, Kris Luyten, Karin Coninx
2008 2008 First International Workshop on Ontologies in Interactive Systems  
Pervasive computing environments are complex to interact with due to the dynamic assembly of interaction resources and the need to adapt to sudden changes in the environment configuration.  ...  We present a semantic meta-layer that encapsulates a model, view and controller to support the design of context-aware pervasive applications that can be controlled and evaluated by the end-users at runtime  ...  Acknowledgments Part of the research at EDM is funded by EFRO (European Fund for Regional Development) and the Flemish Government.  ... 
doi:10.1109/ontoract.2008.15 fatcat:uw6qx3nxcrbynjn7owltvrdmce

Modeling context and situations in pervasive computing environments [article]

Preeti Bhargava, Shivsubramani Krishnamoorthy, Ashok Agrawala
2015 arXiv   pre-print
In pervasive computing environments, various entities often have to cooperate and integrate seamlessly in a situation which can, thus, be considered as an amalgamation of the context of several entities  ...  We highlight several limitations of the existing context models and ontologies, such as lack of provision for provenance, traceability, quality of context, multiple representation of contextual information  ...  Security and Privacy These are implemented in RoCoM using Role Based Access Control (RBAC) for groups and members. A group is an instance of type 'accessgroup' class.  ... 
arXiv:1503.07159v1 fatcat:hoh3q4np6ffo7in77qpijhsknm

ICAF: A Context-Aware Framework for Access Control [chapter]

A. S. M. Kayes, Jun Han, Alan Colman
2012 Lecture Notes in Computer Science  
The framework includes a context model for classifying and capturing access control-oriented contextual information, a situation model for identifying and defining contextual conditions of concern, and  ...  A number of attempts to build frameworks for context-aware systems have been made, but these have not provided adequate support for context-aware access control.  ...  Unlike traditional access control, access control decisions in pervasive environments need to take into account the relevant contextual information such as time and location that reflect the dynamically  ... 
doi:10.1007/978-3-642-31448-3_34 fatcat:xivbfqotdfgdpjwj22a32sqm4a

Ontology-Driven Adaptive and Pervasive Learning Environments – APLEs: An Interdisciplinary Approach [chapter]

Ahmet Soylu, Mieke Vandewaetere, Kelly Wauters, Igor Jacques, Patrick De Causmaecker, Piet Desmet, Geraldine Clarebout, Wim Van den Noortgate
2011 Communications in Computer and Information Science  
Thereafter, we argue for an ontology-driven approach employing ontologies at run-time and development-time where formalized ontologies and rules are considered as main medium of adaptivity, user involvement  ...  Finally, we introduce a prototype domain context ontology for item-based learning environments and demonstrate its run-time and development-time uses.  ...  This paper is based on research funded by the Industrial Research Fund (IOF) and conducted within the IOF Knowledge platform "Harnessing collective intelligence in order to make e-learning environments  ... 
doi:10.1007/978-3-642-20074-8_9 fatcat:mvy5l6iiorfftnp57isn37hucy

Context and Adaptivity in Pervasive Computing Environments: Links with Software Engineering and Ontological Engineering

Ahmet Soylu, Patrick De Causmaecker, Piet Desmet
2009 Journal of Software  
Furthermore, we represent our view point for context-aware pervasive application development particularly based on higher abstraction where ontologies and semantic web activities, also web itself, are  ...  This paper is not meant to provide an extensive review of the literature, but rather to integrate and extend fundamental and promising theoretical and technical aspects found in the literature.  ...  ACKNOWLEDGMENT This paper is based on research funded by the Industrial Research Fund (IOF) and conducted within the IOF Knowledge platform "Harnessing collective intelligence in order to make e-learning  ... 
doi:10.4304/jsw.4.9.992-1013 fatcat:bptost3tjrfnbouv6grkjqcfqa

Semantic Web in the context broker architecture

H. Chen, T. Finin, A. Joshi
2004 Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the  
contextual information.  ...  This document describes a new architecture that exploits Semantic Web technologies for supporting pervasive context-aware systems.  ...  A role based access control mechanism is implemented in Vigil to allow users control to the permissions to access different services using policies.  ... 
doi:10.1109/percom.2004.1276865 dblp:conf/percom/ChenFJ04 fatcat:igsxrzf7o5fy7asoqejmc4uhai

A Semantic Context-Based Model for MobileWeb Services Access Control

Haibo Shen, Yu Cheng
2011 International Journal of Computer Network and Information Security  
Unlike traditional approaches based on the identity or role for access control, access decisions for these applications will depend on the combination of the required attributes of users and the contextual  ...  As mobile web services becomes more pervasive, applications based on mobile web services will need flexible access control mechanisms.  ...  CONCLUSIONS Open, dynamic, and heterogeneous mobile web services environments require new access control solutions, changing the focus of access control models from identity or role-based to the contextual-based  ... 
doi:10.5815/ijcnis.2011.01.03 fatcat:hbdiefizcbgo3ju3abp5w6xxoa

A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues

A. S. M. Kayes, Rudri Kalaria, Iqbal H. Sarker, Md. Saiful Islam, Paul A. Watters, Alex Ng, Mohammad Hammoudeh, Shahriar Badsha, Indika Kumara
2020 Sensors  
We present different taxonomies, such as contextual conditions and authorization models, based on the key issues in this area and discuss the existing context-sensitive access control approaches to tackle  ...  to dynamic cloud environments.  ...  We have introduced a new approach to context-sensitive access control for the specification and activation of dynamic contextual roles based on the relevant contextual conditions [8] .  ... 
doi:10.3390/s20092464 pmid:32349242 fatcat:77owmk23lbej5aqyllwkcmoxt4

Context-Aware Security Policy for the Service Discovery

Slim Trabelsi, Laurent Gomez, Yves Roudier
2007 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)  
Experimental results based on an implementation of our approach are finally presented.  ...  After inherent threats to service discovery in ubiquitous networks, we propose a registry based solution in which contextaware security policies are enforced in order to ensure privacy and access control  ...  The Subject is characterized by a set of attributes (e.g role, location). Based on this triple {Subject, Resource, Action}, a rule-based access control policy is enforced.  ... 
doi:10.1109/ainaw.2007.132 dblp:conf/aina/TrabelsiGR07 fatcat:jsvrpc3o5ffuvoffjlzww3aamm

Semantic-Based Authorization: Need for Context

Mouiad AL-Wahah, Csilla Farkas
2019 International Journal for Digital Society (IJDS)  
In this paper, we present a context-based access control authorization framework. Our approach is suitable to incorporate dynamically changing access control requirements.  ...  The authorization ontology, denoted as CBAC ontology, is used for modeling access control policy requirements.  ...  Conclusion In this paper we have proposed an approach to support context-based access control in the dynamic environment like IoT.  ... 
doi:10.20533/ijds.2040.2570.2019.0180 fatcat:7tbtzipdv5cvdgp3wulmpdebza
« Previous Showing results 1 — 15 out of 11,854 results