A review on extended role based access control (E-RBAC) model in pervasive computing environment

Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. T...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bakar, A.A., Ismail, R., Jais, J.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 535
container_issue
container_start_page 533
container_title
container_volume
creator Bakar, A.A.
Ismail, R.
Jais, J.
description Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as context based access control (CBAC), trust based access control (TBAC) and recently many researchers have focused on enhance the role based access control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas.
doi_str_mv 10.1109/NDT.2009.5272190
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5272190</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5272190</ieee_id><sourcerecordid>5272190</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-e5a5e9b975ec3cf39653cf974cae091e2c0ac9e5a194e23d0171bc91df2127493</originalsourceid><addsrcrecordid>eNpFUEtPAjEYrFESAbmbeOlRD4vf18eWHhHxkRBNDJ6xdD9MDdsl22XVf-8aSTzNIzNzGMbOEcaIYK-fbpdjAWDHWhiBFo7YAJVQSuWo9fG_UOaE9UXnZRMjJj02-C1ZUCKHUzZK6QMApACpctlnb1NeUxvok1eR01dDsaCC19WW-NqljjrvKSXuq9h0Lr-cZy8309kVL6uCtjxEvqO6dSm01GXK3b4J8Z1TbENdxZJic8Z6G7dNNDrgkL3ezZezh2zxfP84my6ygEY3GWmnya6t0eSl30ib6w6sUd4RWCThwXnbpdAqErIANLj2FouNQGGUlUN28bcbiGi1q0Pp6u_V4Sr5A5SlWHY</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A review on extended role based access control (E-RBAC) model in pervasive computing environment</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bakar, A.A. ; Ismail, R. ; Jais, J.</creator><creatorcontrib>Bakar, A.A. ; Ismail, R. ; Jais, J.</creatorcontrib><description>Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as context based access control (CBAC), trust based access control (TBAC) and recently many researchers have focused on enhance the role based access control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas.</description><identifier>ISSN: 2155-8728</identifier><identifier>ISBN: 1424446147</identifier><identifier>ISBN: 9781424446148</identifier><identifier>EISBN: 1424446155</identifier><identifier>EISBN: 9781424446155</identifier><identifier>DOI: 10.1109/NDT.2009.5272190</identifier><identifier>LCCN: 2009904260</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Atmospheric modeling ; Context modeling ; Context-aware services ; Environmental management ; Medical services ; Mobile computing ; Neural networks ; Permission ; Pervasive computing</subject><ispartof>2009 First International Conference on Networked Digital Technologies, 2009, p.533-535</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5272190$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5272190$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bakar, A.A.</creatorcontrib><creatorcontrib>Ismail, R.</creatorcontrib><creatorcontrib>Jais, J.</creatorcontrib><title>A review on extended role based access control (E-RBAC) model in pervasive computing environment</title><title>2009 First International Conference on Networked Digital Technologies</title><addtitle>NDT</addtitle><description>Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as context based access control (CBAC), trust based access control (TBAC) and recently many researchers have focused on enhance the role based access control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas.</description><subject>Access control</subject><subject>Atmospheric modeling</subject><subject>Context modeling</subject><subject>Context-aware services</subject><subject>Environmental management</subject><subject>Medical services</subject><subject>Mobile computing</subject><subject>Neural networks</subject><subject>Permission</subject><subject>Pervasive computing</subject><issn>2155-8728</issn><isbn>1424446147</isbn><isbn>9781424446148</isbn><isbn>1424446155</isbn><isbn>9781424446155</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFUEtPAjEYrFESAbmbeOlRD4vf18eWHhHxkRBNDJ6xdD9MDdsl22XVf-8aSTzNIzNzGMbOEcaIYK-fbpdjAWDHWhiBFo7YAJVQSuWo9fG_UOaE9UXnZRMjJj02-C1ZUCKHUzZK6QMApACpctlnb1NeUxvok1eR01dDsaCC19WW-NqljjrvKSXuq9h0Lr-cZy8309kVL6uCtjxEvqO6dSm01GXK3b4J8Z1TbENdxZJic8Z6G7dNNDrgkL3ezZezh2zxfP84my6ygEY3GWmnya6t0eSl30ib6w6sUd4RWCThwXnbpdAqErIANLj2FouNQGGUlUN28bcbiGi1q0Pp6u_V4Sr5A5SlWHY</recordid><startdate>200907</startdate><enddate>200907</enddate><creator>Bakar, A.A.</creator><creator>Ismail, R.</creator><creator>Jais, J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200907</creationdate><title>A review on extended role based access control (E-RBAC) model in pervasive computing environment</title><author>Bakar, A.A. ; Ismail, R. ; Jais, J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-e5a5e9b975ec3cf39653cf974cae091e2c0ac9e5a194e23d0171bc91df2127493</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Atmospheric modeling</topic><topic>Context modeling</topic><topic>Context-aware services</topic><topic>Environmental management</topic><topic>Medical services</topic><topic>Mobile computing</topic><topic>Neural networks</topic><topic>Permission</topic><topic>Pervasive computing</topic><toplevel>online_resources</toplevel><creatorcontrib>Bakar, A.A.</creatorcontrib><creatorcontrib>Ismail, R.</creatorcontrib><creatorcontrib>Jais, J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bakar, A.A.</au><au>Ismail, R.</au><au>Jais, J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A review on extended role based access control (E-RBAC) model in pervasive computing environment</atitle><btitle>2009 First International Conference on Networked Digital Technologies</btitle><stitle>NDT</stitle><date>2009-07</date><risdate>2009</risdate><spage>533</spage><epage>535</epage><pages>533-535</pages><issn>2155-8728</issn><isbn>1424446147</isbn><isbn>9781424446148</isbn><eisbn>1424446155</eisbn><eisbn>9781424446155</eisbn><abstract>Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as context based access control (CBAC), trust based access control (TBAC) and recently many researchers have focused on enhance the role based access control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas.</abstract><pub>IEEE</pub><doi>10.1109/NDT.2009.5272190</doi><tpages>3</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2155-8728
ispartof 2009 First International Conference on Networked Digital Technologies, 2009, p.533-535
issn 2155-8728
language eng
recordid cdi_ieee_primary_5272190
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Atmospheric modeling
Context modeling
Context-aware services
Environmental management
Medical services
Mobile computing
Neural networks
Permission
Pervasive computing
title A review on extended role based access control (E-RBAC) model in pervasive computing environment
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T16%3A50%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20review%20on%20extended%20role%20based%20access%20control%20(E-RBAC)%20model%20in%20pervasive%20computing%20environment&rft.btitle=2009%20First%20International%20Conference%20on%20Networked%20Digital%20Technologies&rft.au=Bakar,%20A.A.&rft.date=2009-07&rft.spage=533&rft.epage=535&rft.pages=533-535&rft.issn=2155-8728&rft.isbn=1424446147&rft.isbn_list=9781424446148&rft_id=info:doi/10.1109/NDT.2009.5272190&rft_dat=%3Cieee_6IE%3E5272190%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424446155&rft.eisbn_list=9781424446155&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5272190&rfr_iscdi=true