By Topic

RBAC-Based Access Control Framework for ensuring Privacy in Ubiquitous Computing

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Sung-Ho Hong ; Dept. of Comput. Sci. & Eng., Korea Univ., Seoul ; Eun-Ae Cho ; Chang-Joo Moon ; Doo-Kwon Baik

The ubiquitous computing environment is an environment that freely shares all data anytime, anywhere, and through any device without considering constraints. However, the personal or private information in ubiquitous computing could be disclosed, shared from anyone, or used maliciously without consent from the owner of the data. Thus, privacy is one of the major issues in such an environment. Of many security methods, which are able to protect the privacy, The role-based access control (RBAC) model, a typical access control model within the enterprise environment, has been widely studied, applied to various applications, and implemented. However, much existing research for access control has not solved the privacy concerns within ubiquitous computing. This paper proposes a method and framework of user-centric and efficient access control to handle personal privacy within ubiquitous computing environment by using both proposed model based on core component of RBAC model and privacy policies

Published in:

Hybrid Information Technology, 2006. ICHIT '06. International Conference on  (Volume:1 )

Date of Conference:

9-11 Nov. 2006