RBAC-based access control framework for ensuring privacy in ubiquitous computing

Sung Ho Hong, Eun Ae Cho, Chang Joo Moon, Doo Kwon Baik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The Ubiquitous computing Environment is an environment that freely shares all data anytime, anywhere, and through any device without considering constraints. However, the personal or private information in ubiquitous computing could be disclosed, shared from anyone, or used maliciously without consent from the owner of the data. Thus, Privacy is one of the major issues in such an environment. Of many security methods, which are able to protect the privacy, The Role-Based Access Control (RBAC) model, a typical access control model within the enterprise environment, has been widely studied, applied to various applications, and implemented. However, much existing research for access control has not solved the privacy concerns within ubiquitous computing. This paper proposes a method and framework of user-centric and efficient access control to handle personal privacy within ubiquitous computing environment by using both proposed model based on core component of RBAC model and privacy policies.

Original languageEnglish
Title of host publicationProceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006
Pages278-283
Number of pages6
Volume1
DOIs
Publication statusPublished - 2006 Dec 1
Event2006 International Conference on Hybrid Information Technology, ICHIT 2006 - Cheju Island, Korea, Republic of
Duration: 2006 Nov 92006 Nov 11

Other

Other2006 International Conference on Hybrid Information Technology, ICHIT 2006
CountryKorea, Republic of
CityCheju Island
Period06/11/906/11/11

    Fingerprint

ASJC Scopus subject areas

  • Media Technology

Cite this

Hong, S. H., Cho, E. A., Moon, C. J., & Baik, D. K. (2006). RBAC-based access control framework for ensuring privacy in ubiquitous computing. In Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006 (Vol. 1, pp. 278-283). [4021102] https://doi.org/10.1109/ICHIT.2006.253499