uT-RBAC: Ubiquitous Role-Based Access Control Model

@article{Chae2006uTRBACUR,
  title={uT-RBAC: Ubiquitous Role-Based Access Control Model},
  author={Song-hwa Chae and Wonil Kim and Dong-Kyoo Kim},
  journal={IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
  year={2006},
  volume={89-A},
  pages={238-239}
}
In ubiquitous environment that users access resource anytime and anywhere, access control model should consider user's location information. The proposed uT-RBAC includes the location information for user's least privilege. It also supports time related information, which enables the access control model to accommodate various ubiquitous environments. The proposed uT-RBAC can be dynamically applied to various ubiquitous computing envrionment. 

Figures from this paper

Multi-granularity time-constraint Role-based access control
TLDR
A new RBAC model with multi-granularity time character called MG-TRBAC, which can adjust the minimum time unit threshold automatically and can save time and computational work deeply and efficiently is proposed.
Authentication and Authorization Service for X-SIGMA System
TLDR
This paper will focus on access control aspect of the security mechanism for X-SIGMA system which is designed to manage user access so that can protect data from banned users.
Towards a Pervasive Access Control within Video Surveillance Systems
TLDR
This paper applies an access control layer on top of the LINDO architecture that takes into consideration the user’s context and situation and recommends alternative resources to the user when he is facing an important situation.
Development of a system framework for implementation of an enhanced role-based access control model to support collaborative processes
TLDR
A generic system framework to implement the enhanced Role-Based Access Control with three functional layers is reported, which has successfully applied the enhanced RBAC model to the New York State HIV Clinical Education Initiative (CEI) for coordination of clinical education programs.
Aspects of role provisioning in telecare services
  • Y. Liu, J. Bacon
  • Computer Science
    2010 IEEE International Conference on Advanced Management Science(ICAMS 2010)
  • 2010
TLDR
It is shown that the complexity of role provisioning is attributable not only to defining a role or roles within an organisation, but also to a large degree of uncertainty on how to manage online-contexts.
Towards a business-centric definition of access control policies
TLDR
This paper defines a metamodel for access control to gather the different aspects of access control and introduces extensions to the UML et to BPMN that can derive functional requirements, and model security to generate actual security policies.
A Practical Synthesis of Dynamic Role Settings in Telecare Services
  • Y. Liu, J. Bacon
  • Computer Science
    First International Conference on the Digital Society (ICDS'07)
  • 2007
TLDR
It is shown that the complexity of role provisioning is attributable not only to defining a role or roles within an organisation, but also to a large degree of uncertainty on how to manage online-contexts.
Availability, Reliability, and Security in Information Systems and HCI
TLDR
This paper focuses on the conceptual benefits and risks such an integration of sensor data into social media in the case of a patient room and introduces a way to deal with these problems.
Operations requirements in SOA based solutions
  • L. Will
  • Computer Science
    2011 FIFTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE
  • 2011
TLDR
It is shown that there are new requirements for services within SOA and that it is possible and necessary to standardize these activities to support the approach of such a central administration cockpit.
Beyond user experience of cloud service: Implication for value sensitive approach
...
1
2
...

References

SHOWING 1-4 OF 4 REFERENCES
A generalized temporal role-based access control model
TLDR
This work proposes a generalized temporal role-based access control (GTRBAC) model capable of expressing a wider range of temporal constraints and allows expressing periodic as well as duration constraints on roles, user-role assignments, and role-permission assignments.
Proposed NIST standard for role-based access control
TLDR
Although RBAC continues to evolve as users, researchers, and vendors gain experience with its application, the features and components proposed in this standard represent a fundamental and stable set of mechanisms that may be enhanced by developers in further meeting the needs of their customers.
SRBAC : A Spatial Role-Based Access Control Model for Mobile Systems
  • 2003
TRBAC: A temporal rolebased access control model
  • ACM Trans. Information and System Security, vol.4, no.3, pp.191–223, 2001.
  • 2001