By Topic

A Context, Rule and Role-Based Access Control Model In Enterprise Pervasive Computing Environment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Xianzhi Huang ; Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan ; Haiyang Wang ; Yuehui Chen ; Jinjiao Lin

With the enterprise applications being integrated into the pervasive computing environment, the traditional role-based access control model has not been suitable to the new requirements of dynamic controlling the access authority of enterprise resources. In this paper, a context, rule and role-based access control model in enterprise pervasive computing environment is proposed. Through dynamic context and rule-based controlling of the permissions of access enterprise resources, the model repaired the vulnerabilities of the static management existing in the role-based access authority of the traditional RBAC model. The model can provide a simple and efficient solution to integrate the enterprise applications into pervasive computing environment. It is also verified that the proposed model can be applied into the enterprise applications in the pervasive computing environment by the implementation of a prototype system

Published in:

Pervasive Computing and Applications, 2006 1st International Symposium on

Date of Conference:

3-5 Aug. 2006