CFP last date
20 May 2024
Reseach Article

Formal Model based Specification of Authorization Framework for Ubiquitous Enterprise Computing Environment

by Supreet Kaur, Kawaljeet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 92 - Number 15
Year of Publication: 2014
Authors: Supreet Kaur, Kawaljeet Singh
10.5120/16083-5220

Supreet Kaur, Kawaljeet Singh . Formal Model based Specification of Authorization Framework for Ubiquitous Enterprise Computing Environment. International Journal of Computer Applications. 92, 15 ( April 2014), 13-21. DOI=10.5120/16083-5220

@article{ 10.5120/16083-5220,
author = { Supreet Kaur, Kawaljeet Singh },
title = { Formal Model based Specification of Authorization Framework for Ubiquitous Enterprise Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 92 },
number = { 15 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 13-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume92/number15/16083-5220/ },
doi = { 10.5120/16083-5220 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:14:22.359643+05:30
%A Supreet Kaur
%A Kawaljeet Singh
%T Formal Model based Specification of Authorization Framework for Ubiquitous Enterprise Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 92
%N 15
%P 13-21
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the emergence of new dynamic computing environments, the traditional identity based authorization models are unable to meet multiple attribute based policy requirements through single function based access control model. There is need for a flexible and scalable authorization model that can meet the different protection requirement of the computing system and adapt to the demand of real world security requirements. In this paper a formal authorization model for ubiquitous computing environment is proposed. Ubiquitous computing environment demands a dynamic access control mechanism that can adapt to the changing security requirement of the computing environment. The proposed security model has taken these factors into consideration and adopted a formal approach to design a flexible and scalable model to support intelligent authorization process in ubiquitous computing environment.

References
  1. M. Weiser, "The Computer for the Twenty-First Century," in Scientific American, vol. 265, 1991, pp. 94-104.
  2. M. Weiser, Ubiquitous Computing, Computer, v. 26 n. 10, p. 71-72, October 1993
  3. Z-FSN. (2002). Information technology — Z formal specification notation. Syntax, type system and semantics, ISO/IEC 13568:2002(E), International Standard
  4. Lyytinen, K. , Yoo, Y. 2002. Issues and Challenges in Ubiquitous Computing. Communications of the ACM45:62-65
  5. Lampson, Butler W. (1971). "Protection". Proceedings of the 5th Princeton Conference on Information Sciences and Systems. p. 437.
  6. Ravi S. Sandhu. Lattice-based access control models. IEEE Computer, 1993.
  7. David F. Ferraiolo and D. Richard Kuhn, "Role-Based Access Controls," Proceedings of the 15th NIST-NSA National Computer Security Conference, Baltimore, Maryland, October 13-16, 1992
  8. Ravi S. Sandhu and P. Samarati. Access control: Principles and practice. IEEE Com. Mag. , 1994.
  9. Al-Muhtadi, J. , Ranganathan, A. , Campbell, R. , Mickunas, M. D. (2003). Cerberus: a context-aware security scheme for smart spaces," Pervasive Computing and Communications, 2003. Proceedings of the First IEEE International Conference on, vol. , no. , pp. 489-496.
  10. Kim, Y. , Moon, C. ,Jeong, D. , Lee,J. , Song,C. and Baik, D. (2005). Context-aware access control mechanism for ubiquitous applications. In AWIC, pp. 236–242.
  11. Sampemane, G. (2005). Access Control for Active Spaces. Doctoral Thesis. UMI Order Number: AAI3199131. , University of Illinois at Urbana-Champaign.
  12. Song-hwa, C. ,Wonil, K. and Dong-kyoo, K. (2006). Role-Based Access Control Model for Ubiquitous Computing Environment, LNCS, Volume 3786,pp. 354-363.
  13. Wang, H. ,Zhang, Y. and Cao, J. (2008). Access control management for ubiquitous computing. Future Generation Computer, pp. 870-878.
  14. Lin L. and Tianjie C. , 2008. A Flexible, Autonomous and Non-redundancy Access Control for Ubiquitous Computing Environment. In Proceedings of the 2008 International Symposium on Information Science and Engieering - Volume 01 (ISISE '08), Vol. 1. IEEE Computer Society, Washington, DC, USA, 446-450
  15. Hung, L. , Shaikh, A. , Jameel, H. , Raazi, S. , Yuan, W. , Ngo, T. , Truc, P. , Sungyoung, L. , Heejo L. ,Yuseung, S. ,Fernandes, M. (2009). Activity-Oriented Access Control for Ubiquitous Environments. 6th IEEE Consumer Communications and Networking Conference, pp. 1-5.
  16. Filho, J. , Martin, H. (2008). Using Context Quality Indicators for Improving Context-Based Access Control in Pervasive Environments. IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 285-290.
  17. Sejong, O. (2010). New role-based access control in ubiquitous e-business environment. Journal of Intelligent Manufacturing,pp. 607-612.
  18. Hu, T. C. , Ferraiolo, D. , Kuhn, R. , Friedman, A. R. , Lang, A. J. , Cogdell, M. M. , Schnitzer, A. , Sandlin, K. ,Miller, R. , Scarfone, K(2013). Guide to Attribute Based Access Control (ABAC) Defnition and Considerations (Draft) ,NIST Special Publication 800-162.
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Authorization Formal Methods Security Model Ubiquitous Computing.