TY - GEN
T1 - Integrating attribute and status constraint into the RBAC model for access control in ubiquitous systems
AU - Zou, Deqing
AU - Park, Jong Hyuk
AU - Kim, Tai Hoon
AU - Chen, Xueguang
PY - 2007
Y1 - 2007
N2 - It now becomes a trend to implement the interconnections between resources as well as services in ubiquitous systems. Attribute-based authorization mechanisms, protocols and systems are gaining in popularity, such as SAML, XACML, Shibboleth, etc. However, their management efficiency could be further improved. The Role-based Access Control (RBAC) mechanism is widely accepted as a general mechanism for authorization management. However, RBAC is still not flexible enough to address various application scenarios in ubiquitous systems. We propose a new architecture for access control in ubiquitous systems that impose attribute and status constraints on the RBAC model, which can significantly enhance the generality and flexibility of authorization by integrating the advantages of RBAC and attributed-based access control models. Moreover, the state mechanism proposed in this architecture captures the states of the authorization elements so as to reflect the outcomes of the authorization control. Finally, we analyze the flexibility and generality of this architecture in ubiquitous systems.
AB - It now becomes a trend to implement the interconnections between resources as well as services in ubiquitous systems. Attribute-based authorization mechanisms, protocols and systems are gaining in popularity, such as SAML, XACML, Shibboleth, etc. However, their management efficiency could be further improved. The Role-based Access Control (RBAC) mechanism is widely accepted as a general mechanism for authorization management. However, RBAC is still not flexible enough to address various application scenarios in ubiquitous systems. We propose a new architecture for access control in ubiquitous systems that impose attribute and status constraints on the RBAC model, which can significantly enhance the generality and flexibility of authorization by integrating the advantages of RBAC and attributed-based access control models. Moreover, the state mechanism proposed in this architecture captures the states of the authorization elements so as to reflect the outcomes of the authorization control. Finally, we analyze the flexibility and generality of this architecture in ubiquitous systems.
UR - http://www.scopus.com/inward/record.url?scp=52249088695&partnerID=8YFLogxK
U2 - 10.1109/fgcn.2007.152
DO - 10.1109/fgcn.2007.152
M3 - Conference contribution
AN - SCOPUS:52249088695
SN - 0769530486
SN - 9780769530482
T3 - Proceedings of Future Generation Communication and Networking, FGCN 2007
SP - 71
EP - 75
BT - Proceedings of Future Generation Communication and Networking, FGCN 2007
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2007 International Conference on Future Generation Communication and Networking, FGCN 2007
Y2 - 6 December 2007 through 8 December 2007
ER -