期刊文献+

普适环境下的模糊访问控制模型研究 被引量:2

Research on fuzzy access control model for ubiquitous computing environments
下载PDF
导出
摘要 现有的普适访问控制模型的研究都忽视了安全中存在的模糊性问题。在普适计算环境中上下文信息可能是不完备或者模糊的,因此由残缺或模糊的上下文信息推导授权结果就显得十分重要。在使用控制模型的基础上,提出了一个模糊的普适访问控制模型(fuzzy usage control models,FUCM),给出了模型的形式化定义,并通过实例对模型的授权过程进行分析。结果表明新的模型能够对模糊的上下文信息进行授权决策,并具有更智能的授权能力,更适用于普适计算环境。最后,给出了模型实现的参考监视器体系结构。 Ubiquitous computing will be looked as mainstream computing model in future. How to protect the data security is a key issue to extend ubiquitous computing. Usage control model(UCON)is as the next generation access control model, it is more fit in ubiquitous computing environment. But UCON is a lack of description of fuzzy security problem. In ubiquitous computing environment, context information may be imperfectly and fuzzy, so it is important to infer authorization result by imperfectly and fuzzy context information. Be based upon UCON, this paper gave a fuzzy access control model: FUCM, and gave a formalized model. The new model could deal with fuzzy context information, and it had more intelligent authorization.
出处 《计算机应用研究》 CSCD 北大核心 2008年第12期3720-3724,3738,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(60773224) 国家教育部科学研究重点资助项目(107106) 陕西省自然科学基金资助项目(2006F27)
关键词 普适计算 使用控制 模糊逻辑 安全模型 体系结构 ubiquitous computing usage control fuzzy logic security model architecture
  • 相关文献

参考文献14

  • 1WEISER M. The computer of the 21 st century [ J]. Scientific American, 1991,265 (3) :66-75.
  • 2SATYANARAYANAN M. Pervasive computing: vision and challenge [J]. IEEE Personal Communications, 2001,8(8) : 10-17.
  • 3WANG Jun, YANG Ya-ling, YURCIK W. Secure smart environments : security requirements, challenges and experiences in pervasive computing[ C ]//Proc of NSF Pervasive Computing Infrastructure and Experience Workshop. 2005 : 36-48.
  • 4XIU Dao-xi, LIU Zhao-yu. A dynamic trust model for pervasive computing environments [ C ]//Proc of the 4th Annual Security Conference. Las Vegas : [ s. n. ] , 2005.
  • 5ZHANG Guang-sen, PARASHAR M. Context-aware dynamic access control for pervasive applications [ C ]//Proc of Communication Networks and Distributed Systems Modeling and Simulation Conference. San Diego : [ s. n. ], 2004.
  • 6ALY S G. A policy-based location identification architecture for pervasive systems [ C ]//Proc of the 2006 World Congress in Computer Science Computer Engineering and Applied Computing. 2006.
  • 7TRIAPATHI A, AHMED T, KULKARNI D, et al. Context-based secure resource access in pervasive computing environments[ C ]//Proc of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops. 2004 : 159-163.
  • 8WEAVER A C. A security architecture for data privacy and security [ C ]//Proc of the 10th IEEE Conference on Emerging Technologies and Factory Automation. 2005 : 156-164.
  • 9PARK J, SANDHU R. The UCONABC usage control model [ J]. ACM Trans on Information and System Security, 2004,7(1):128-174.
  • 10WANG Hua, ZHANG Yam-chum, environments and its usage access national Conference on Scalable ACM Press, 2006. CAO Jin-li. Ubiquitous computing control [ C ]//Proc of the 1 st Inter-Information Systems. New York:

同被引文献14

  • 1郭亚军,洪帆.基于信任的普适计算安全机制[J].计算机工程,2006,32(8):168-169. 被引量:2
  • 2林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 3BACON J, MOODY K, YAO W. A model of OASIS role-based access control and its support for active security [J J . ACM Trans on Information and System Security,2002,5(4) :492-540.
  • 4CHOI J H, KANG D H, JANG H, et al. Adaptive access control scheme utilizing context awareness in pervasive computing environments [ C ] IIProc of IEEE International Conference on Computing and Communications. 2008 :491-498.
  • 5LISCANO R, WANG Kai-ning. A context-based delegation access control model for pervasive computing [C J IIProc of the 21 st Advanced Information Networking and Applications Workshops. 2007 :44-51.
  • 6ZHU Zhou, XU Ren-zuo. A context-aware access control model for pervasive computing in enterprise environments [C J IIProc of the 4th International Conference on Wireless Communications, Networking and Mobile Computing. 2008: 1-6.
  • 7CHOI J H, JANG H. CA-RBAC: context aware RBAC scheme in ubiquitous computing environments [J]. Journal of Information Science and Engineering ,2010 ,26 (8) : 1801-1816.
  • 8WANG Juan,LAI Si-yu,LI Ming-dong,et al. An application based on fuzzy access model in pervasive environment] C)I /Proc of International Forumon Information Technology and Applications. Washington DC:IEEE Computer Society,2010:336-340.
  • 9HU Hua, LUO An-de. Actor and trust-based dynamic access control model in universal computing environment [C] I/Proc of the 2nd International Symposium on Intelligent Information Technology Application. Washington DC : IEEE Computer Society ,2008 :683-687.
  • 10TOAHCHOODEE M. Access control models for pervasive computing environments [ M). Fort Collins, USA: Cokorado State University, 2010.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部