A review on extended role based access control (E-RBAC) model in pervasive computing environment
Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. T...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 535 |
---|---|
container_issue | |
container_start_page | 533 |
container_title | |
container_volume | |
creator | Bakar, A.A. Ismail, R. Jais, J. |
description | Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as context based access control (CBAC), trust based access control (TBAC) and recently many researchers have focused on enhance the role based access control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas. |
doi_str_mv | 10.1109/NDT.2009.5272190 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5272190</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5272190</ieee_id><sourcerecordid>5272190</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-e5a5e9b975ec3cf39653cf974cae091e2c0ac9e5a194e23d0171bc91df2127493</originalsourceid><addsrcrecordid>eNpFUEtPAjEYrFESAbmbeOlRD4vf18eWHhHxkRBNDJ6xdD9MDdsl22XVf-8aSTzNIzNzGMbOEcaIYK-fbpdjAWDHWhiBFo7YAJVQSuWo9fG_UOaE9UXnZRMjJj02-C1ZUCKHUzZK6QMApACpctlnb1NeUxvok1eR01dDsaCC19WW-NqljjrvKSXuq9h0Lr-cZy8309kVL6uCtjxEvqO6dSm01GXK3b4J8Z1TbENdxZJic8Z6G7dNNDrgkL3ezZezh2zxfP84my6ygEY3GWmnya6t0eSl30ib6w6sUd4RWCThwXnbpdAqErIANLj2FouNQGGUlUN28bcbiGi1q0Pp6u_V4Sr5A5SlWHY</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A review on extended role based access control (E-RBAC) model in pervasive computing environment</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bakar, A.A. ; Ismail, R. ; Jais, J.</creator><creatorcontrib>Bakar, A.A. ; Ismail, R. ; Jais, J.</creatorcontrib><description>Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as context based access control (CBAC), trust based access control (TBAC) and recently many researchers have focused on enhance the role based access control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas.</description><identifier>ISSN: 2155-8728</identifier><identifier>ISBN: 1424446147</identifier><identifier>ISBN: 9781424446148</identifier><identifier>EISBN: 1424446155</identifier><identifier>EISBN: 9781424446155</identifier><identifier>DOI: 10.1109/NDT.2009.5272190</identifier><identifier>LCCN: 2009904260</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Atmospheric modeling ; Context modeling ; Context-aware services ; Environmental management ; Medical services ; Mobile computing ; Neural networks ; Permission ; Pervasive computing</subject><ispartof>2009 First International Conference on Networked Digital Technologies, 2009, p.533-535</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5272190$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5272190$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bakar, A.A.</creatorcontrib><creatorcontrib>Ismail, R.</creatorcontrib><creatorcontrib>Jais, J.</creatorcontrib><title>A review on extended role based access control (E-RBAC) model in pervasive computing environment</title><title>2009 First International Conference on Networked Digital Technologies</title><addtitle>NDT</addtitle><description>Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as context based access control (CBAC), trust based access control (TBAC) and recently many researchers have focused on enhance the role based access control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas.</description><subject>Access control</subject><subject>Atmospheric modeling</subject><subject>Context modeling</subject><subject>Context-aware services</subject><subject>Environmental management</subject><subject>Medical services</subject><subject>Mobile computing</subject><subject>Neural networks</subject><subject>Permission</subject><subject>Pervasive computing</subject><issn>2155-8728</issn><isbn>1424446147</isbn><isbn>9781424446148</isbn><isbn>1424446155</isbn><isbn>9781424446155</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFUEtPAjEYrFESAbmbeOlRD4vf18eWHhHxkRBNDJ6xdD9MDdsl22XVf-8aSTzNIzNzGMbOEcaIYK-fbpdjAWDHWhiBFo7YAJVQSuWo9fG_UOaE9UXnZRMjJj02-C1ZUCKHUzZK6QMApACpctlnb1NeUxvok1eR01dDsaCC19WW-NqljjrvKSXuq9h0Lr-cZy8309kVL6uCtjxEvqO6dSm01GXK3b4J8Z1TbENdxZJic8Z6G7dNNDrgkL3ezZezh2zxfP84my6ygEY3GWmnya6t0eSl30ib6w6sUd4RWCThwXnbpdAqErIANLj2FouNQGGUlUN28bcbiGi1q0Pp6u_V4Sr5A5SlWHY</recordid><startdate>200907</startdate><enddate>200907</enddate><creator>Bakar, A.A.</creator><creator>Ismail, R.</creator><creator>Jais, J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200907</creationdate><title>A review on extended role based access control (E-RBAC) model in pervasive computing environment</title><author>Bakar, A.A. ; Ismail, R. ; Jais, J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-e5a5e9b975ec3cf39653cf974cae091e2c0ac9e5a194e23d0171bc91df2127493</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Atmospheric modeling</topic><topic>Context modeling</topic><topic>Context-aware services</topic><topic>Environmental management</topic><topic>Medical services</topic><topic>Mobile computing</topic><topic>Neural networks</topic><topic>Permission</topic><topic>Pervasive computing</topic><toplevel>online_resources</toplevel><creatorcontrib>Bakar, A.A.</creatorcontrib><creatorcontrib>Ismail, R.</creatorcontrib><creatorcontrib>Jais, J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bakar, A.A.</au><au>Ismail, R.</au><au>Jais, J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A review on extended role based access control (E-RBAC) model in pervasive computing environment</atitle><btitle>2009 First International Conference on Networked Digital Technologies</btitle><stitle>NDT</stitle><date>2009-07</date><risdate>2009</risdate><spage>533</spage><epage>535</epage><pages>533-535</pages><issn>2155-8728</issn><isbn>1424446147</isbn><isbn>9781424446148</isbn><eisbn>1424446155</eisbn><eisbn>9781424446155</eisbn><abstract>Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as context based access control (CBAC), trust based access control (TBAC) and recently many researchers have focused on enhance the role based access control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas.</abstract><pub>IEEE</pub><doi>10.1109/NDT.2009.5272190</doi><tpages>3</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2155-8728 |
ispartof | 2009 First International Conference on Networked Digital Technologies, 2009, p.533-535 |
issn | 2155-8728 |
language | eng |
recordid | cdi_ieee_primary_5272190 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Atmospheric modeling Context modeling Context-aware services Environmental management Medical services Mobile computing Neural networks Permission Pervasive computing |
title | A review on extended role based access control (E-RBAC) model in pervasive computing environment |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T16%3A50%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20review%20on%20extended%20role%20based%20access%20control%20(E-RBAC)%20model%20in%20pervasive%20computing%20environment&rft.btitle=2009%20First%20International%20Conference%20on%20Networked%20Digital%20Technologies&rft.au=Bakar,%20A.A.&rft.date=2009-07&rft.spage=533&rft.epage=535&rft.pages=533-535&rft.issn=2155-8728&rft.isbn=1424446147&rft.isbn_list=9781424446148&rft_id=info:doi/10.1109/NDT.2009.5272190&rft_dat=%3Cieee_6IE%3E5272190%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424446155&rft.eisbn_list=9781424446155&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5272190&rfr_iscdi=true |