We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Formal Policy based Authorization Model for Ubiquitous Enterprise Computing Environment

by Supreet Kaur, Kawaljeet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 6
Year of Publication: 2013
Authors: Supreet Kaur, Kawaljeet Singh
10.5120/12746-9668

Supreet Kaur, Kawaljeet Singh . Formal Policy based Authorization Model for Ubiquitous Enterprise Computing Environment. International Journal of Computer Applications. 73, 6 ( July 2013), 26-33. DOI=10.5120/12746-9668

@article{ 10.5120/12746-9668,
author = { Supreet Kaur, Kawaljeet Singh },
title = { Formal Policy based Authorization Model for Ubiquitous Enterprise Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 6 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number6/12746-9668/ },
doi = { 10.5120/12746-9668 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:39:22.049516+05:30
%A Supreet Kaur
%A Kawaljeet Singh
%T Formal Policy based Authorization Model for Ubiquitous Enterprise Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 6
%P 26-33
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Ubiquitous computing environment demands a dynamic access control mechanism that can adapt to the changing security requirement of the computing environment. In this paper an authorization model for ubiquitous computing environment is proposed and a formal approach is adopted to design a flexible and scalable model to support intelligent authorization process in ubiquitous computing environment.

References
  1. M. Weiser 1991, "The Computer for the Twenty-First Century," in Scientific American, vol. 265, 1991, pp. 94-104.
  2. M. Weiser 1993, Ubiquitous Computing, Computer, v. 26 n. 10, p. 71-72.
  3. Lampson, Butler W. 1971. "Protection". Proceedings of the 5th Princeton Conference on Information Sciences and Systems. p. 437.
  4. David F. Ferraiolo and D. Richard Kuhn 1992, "Role-Based Access Controls," Proceedings of the 15th NIST-NSA National Computer Security Conference, Baltimore, Maryland, October 13-16.
  5. Ravi S. Sandhu 1993. Lattice-based access control models. IEEE Computer.
  6. Ravi S. Sandhu and P. Samarati 1994. Access control: Principles and practice. IEEE Com. Mag.
  7. Antonio Corradi, Rebecca Montanari, and Daniela Tibaldi. 2004. Context-Based Access Control Management in Ubiquitous Environments. In Proceedings of the Network Computing and Applications, Third IEEE International Symposium (NCA '04). IEEE Computer Society, Washington, DC, USA, 253-260
  8. Lin L. and Tianjie C. , 2008. A Flexible, Autonomous and Non-redundancy Access Control for Ubiquitous Computing Environment. In Proceedings of the 2008 International Symposium on Information Science and Engieering - Volume 01 (ISISE '08), Vol. 1. IEEE Computer Society, Washington, DC, USA, 446-450.
  9. Hung L. X. , Riaz A. S. , Hassan J. , Raazi S. M. , Yuan W. , Ngo T. C. , Truc P. T. , Lee S. , Lee H. , Yuseung S. , and Miguel F. 2009. Activity-oriented access control for ubiquitous environments. In Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference (CCNC'09). IEEE Press, Piscataway, NJ, USA, 1402-1406.
  10. Sejong O. , 2010. New role-based access control in ubiquitous e-business environment. J. Intell. Manuf. 21, 5 , 607-612.
  11. Manachai T. and Indrakshi R. , 2011. On the formalization and analysis of a spatio-temporal role-based access control model. J. Comput. Secur. 19, 3 , 399-452.
  12. Sigrid S. and Strembeck M. 2012. Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments. In Proceedings of the 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing . IEEE Computer Society, Washington, DC, USA, 126-131.
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Authorization Formal Methods Security Model Ubiquitous Computing