Abstract

AbstractWith the applications development of pervasive computing which advances new demands of access control in information security. Use Usage Control model to solve problem of access control in Pervasive Computing system and provide a model of Usage Control in Pervasive Computing system (UCON_PC) and context information is added in the model, simultaneously delegate subject can delegate rights to the entrusted subject, and the model satisfies the demands of access control in pervasive computing system.KeywordsInformation SecurityPervasive ComputingUsage ControlContext

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call