files/journal/2022-09-02_11-59-20-000000_418.png

Asian Journal of Information Technology

ISSN: Online 1993-5994
ISSN: Print 1682-3915
144
Views
1
Downloads

Context-Role Based Access Control Model for Ubiquitous Computing Environment

Li Lin and Tianjie Cao
Page: 74-78 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

In ubiquitous computing environment user move frequently and access resources anytime and anywhere. Ubiquity and invisibility are the distinct characteristics of ubiquitous computing. Numerous entities are always unknown to local system. The security service should consider the factor of time, location and trust to enhance the security of interaction between each other. The exiting access control consider just one dimension, temporal, spatial or trust. In this study, we propose a new access control model supporting these three dimensions simultaneously. The proposed access control model can effectively support various ubiquitous computing environments.


How to cite this article:

Li Lin and Tianjie Cao . Context-Role Based Access Control Model for Ubiquitous Computing Environment.
DOI: https://doi.org/10.36478/ajit.2008.74.78
URL: https://www.makhillpublications.co/view-article/1682-3915/ajit.2008.74.78