Abstract
Pervasive computing applications have unique characteristics that preclude the use of traditional access control models, such as Role-Based Access Control (RBAC), for their protection. Such models do not take into account contextual information before making access decisions and cannot handle the dynamism inherent in pervasive computing applications. Towards this end, we propose new spatio-temporal access control models for use in such applications and formally define their semantics using graph-theoretic notation. The dynamism inherent in pervasive computing applications may cause the access control configuration to change while the policies are deployed. Towards this end, we show how to perform incremental analysis to give assurance that security breaches do not occur as a result of changing the access control configuration. Our analysis makes clever use of data structures and achieves good time complexity results.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International journal of next-generation computing
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.