By Topic

A review on extended role based access control (E-RBAC) model in pervasive computing environment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Asmidar Abu Bakar ; Coll. of Inf. Technol., Univ. Tenaga Nasional, Malaysia ; Roslan Ismail ; Jamilin Jais

Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as context based access control (CBAC), trust based access control (TBAC) and recently many researchers have focused on enhance the role based access control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas.

Published in:

2009 First International Conference on Networked Digital Technologies

Date of Conference:

28-31 July 2009