The Community for Technology Leaders
2010 14th Panhellenic Conference on Informatics (2010)
Tripoli, Greece
Sept. 10, 2010 to Sept. 12, 2010
ISBN: 978-0-7695-4172-3
pp: 118-123
The operational characteristics of ubiquitous computing environments (UbiCom) generate new access control requirements which existing classical access control models fail to support efficiently. However, the Usage Control (UCON) family of models introduces components and mechanisms that seem to be able to partially match the specific requirements imposed by UbiCom environments. In this paper, an evaluation of current access control models based on a brief study of UbiCom access control requirements is presented. Then, a new access control approach that extends UCON towards a differentiated utilization of attribute mutability for easiness of administration, better performance and lower operational cost in UbiCom environments is proposed.
access control, ubiquitous computing, UCON, context, attribute mutability

I. Mavridis and C. Grompanopoulos, "Towards Differentiated Utilization of Attribute Mutability for Access Control in Ubiquitous Computing," 2010 14th Panhellenic Conference on Informatics(PCI), Tripoli, Greece, 2010, pp. 118-123.
91 ms
(Ver 3.3 (11022016))