237 research outputs found

    Benefits of Location-Based Access Control:A Literature Study

    Get PDF
    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been investigated thoroughly. To this end, we perform a structured literature review, and examine the goals that LBAC can potentially fulfill, \ud the specific LBAC systems that realize these goals and the context on which LBAC depends. Our paper has four main contributions:\ud first we propose a theoretical framework for LBAC evaluation, based on goals, systems and context. Second, we formulate and apply criteria for evaluating the usefulness of an LBAC system. Third, we identify four usage scenarios for LBAC: open areas and systems, hospitals, enterprises, and finally data centers and military facilities. Fourth, we propose directions for future research:\ud (i) assessing the tradeoffs between location-based, physical and logical access control, (ii) improving the transparency of LBAC decision making, and \ud (iii) formulating design criteria for facilities and working environments for optimal LBAC usage

    CRiBAC: Community-centric role interaction based access control model

    Get PDF
    As one of the most efficient solutions to complex and large-scale problems, multi-agent cooperation has been in the limelight for the past few decades. Recently, many research projects have focused on context-aware cooperation to dynamically provide complex services. As cooperation in the multi-agent systems (MASs) becomes more common, guaranteeing the security of such cooperation takes on even greater importance. However, existing security models do not reflect the agents' unique features, including cooperation and context-awareness. In this paper, we propose a Community-based Role interaction-based Access Control model (CRiBAC) to allow secure cooperation in MASs. To do this, we refine and extend our preliminary RiBAC model, which was proposed earlier to support secure interactions among agents, by introducing a new concept of interaction permission, and then extend it to CRiBAC to support community-based cooperation among agents. We analyze potential problems related to interaction permissions and propose two approaches to address them. We also propose an administration model to facilitate administration of CRiBAC policies. Finally, we present the implementation of a prototype system based on a sample scenario to assess the proposed work and show its feasibility. © 2012 Elsevier Ltd. All rights reserved

    A data modeling conceptual framework for ubiquitous computing based on context awareness

    Get PDF
    This paper introduces a framework for data modeling to support ubiquitous computing based on context-awareness.  Data always grow in term of volume, variety, velocity, and value. The problem arises when it grows exponentially. Consequently, data is anywhere and requirements change in early data definitions then data design become not as the plan.  Therefore, suitable approach with new paradigm and methods of data modeling needs to be enhanced to solve the problems in the real world. Data model must consider the active object that related to each other. Any objects may interact with each other in a ubiquitous way and recorded in digital technology. Sensors, actuator devices, and radio frequency identification technology may support communication between objects through ubiquitous computing. The data model in Ubiquitous Computing needs to restructure to become active and dynamic.  Ubiquitous computing is a model that enable all objects around the people to communicate and invisible. In order to support this paradigm, a new perspective of how data are designed and stored on each object is needed. Furthermore, using ubiquitous computing, the pervasive network can request and response information, which means the devices may communicate and has the initiative to solve a problem without human intervention.  Human wants more intelligence objects. Therefore, more sensors and memory are required. Data structures need to enhance or embedded into any devices that interact with the human

    Identity Management Framework for Internet of Things

    Get PDF
    corecore