RBAC-based access control framework for ensuring privacy in ubiquitous computing

Sung Ho Hong, Eun Ae Cho, Chang Joo Moon, Doo Kwon Baik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The Ubiquitous computing Environment is an environment that freely shares all data anytime, anywhere, and through any device without considering constraints. However, the personal or private information in ubiquitous computing could be disclosed, shared from anyone, or used maliciously without consent from the owner of the data. Thus, Privacy is one of the major issues in such an environment. Of many security methods, which are able to protect the privacy, The Role-Based Access Control (RBAC) model, a typical access control model within the enterprise environment, has been widely studied, applied to various applications, and implemented. However, much existing research for access control has not solved the privacy concerns within ubiquitous computing. This paper proposes a method and framework of user-centric and efficient access control to handle personal privacy within ubiquitous computing environment by using both proposed model based on core component of RBAC model and privacy policies.

Original languageEnglish
Title of host publicationProceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006
Pages278-283
Number of pages6
Volume1
DOIs
Publication statusPublished - 2006 Dec 1
Event2006 International Conference on Hybrid Information Technology, ICHIT 2006 - Cheju Island, Korea, Republic of
Duration: 2006 Nov 92006 Nov 11

Other

Other2006 International Conference on Hybrid Information Technology, ICHIT 2006
CountryKorea, Republic of
CityCheju Island
Period06/11/906/11/11

Fingerprint

Ubiquitous computing
Access control
Industry

ASJC Scopus subject areas

  • Media Technology

Cite this

Hong, S. H., Cho, E. A., Moon, C. J., & Baik, D. K. (2006). RBAC-based access control framework for ensuring privacy in ubiquitous computing. In Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006 (Vol. 1, pp. 278-283). [4021102] https://doi.org/10.1109/ICHIT.2006.253499

RBAC-based access control framework for ensuring privacy in ubiquitous computing. / Hong, Sung Ho; Cho, Eun Ae; Moon, Chang Joo; Baik, Doo Kwon.

Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006. Vol. 1 2006. p. 278-283 4021102.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hong, SH, Cho, EA, Moon, CJ & Baik, DK 2006, RBAC-based access control framework for ensuring privacy in ubiquitous computing. in Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006. vol. 1, 4021102, pp. 278-283, 2006 International Conference on Hybrid Information Technology, ICHIT 2006, Cheju Island, Korea, Republic of, 06/11/9. https://doi.org/10.1109/ICHIT.2006.253499
Hong SH, Cho EA, Moon CJ, Baik DK. RBAC-based access control framework for ensuring privacy in ubiquitous computing. In Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006. Vol. 1. 2006. p. 278-283. 4021102 https://doi.org/10.1109/ICHIT.2006.253499
Hong, Sung Ho ; Cho, Eun Ae ; Moon, Chang Joo ; Baik, Doo Kwon. / RBAC-based access control framework for ensuring privacy in ubiquitous computing. Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006. Vol. 1 2006. pp. 278-283
@inproceedings{7dcae9c6d3834304966e79a0903a91f4,
title = "RBAC-based access control framework for ensuring privacy in ubiquitous computing",
abstract = "The Ubiquitous computing Environment is an environment that freely shares all data anytime, anywhere, and through any device without considering constraints. However, the personal or private information in ubiquitous computing could be disclosed, shared from anyone, or used maliciously without consent from the owner of the data. Thus, Privacy is one of the major issues in such an environment. Of many security methods, which are able to protect the privacy, The Role-Based Access Control (RBAC) model, a typical access control model within the enterprise environment, has been widely studied, applied to various applications, and implemented. However, much existing research for access control has not solved the privacy concerns within ubiquitous computing. This paper proposes a method and framework of user-centric and efficient access control to handle personal privacy within ubiquitous computing environment by using both proposed model based on core component of RBAC model and privacy policies.",
author = "Hong, {Sung Ho} and Cho, {Eun Ae} and Moon, {Chang Joo} and Baik, {Doo Kwon}",
year = "2006",
month = "12",
day = "1",
doi = "10.1109/ICHIT.2006.253499",
language = "English",
isbn = "0769526748",
volume = "1",
pages = "278--283",
booktitle = "Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006",

}

TY - GEN

T1 - RBAC-based access control framework for ensuring privacy in ubiquitous computing

AU - Hong, Sung Ho

AU - Cho, Eun Ae

AU - Moon, Chang Joo

AU - Baik, Doo Kwon

PY - 2006/12/1

Y1 - 2006/12/1

N2 - The Ubiquitous computing Environment is an environment that freely shares all data anytime, anywhere, and through any device without considering constraints. However, the personal or private information in ubiquitous computing could be disclosed, shared from anyone, or used maliciously without consent from the owner of the data. Thus, Privacy is one of the major issues in such an environment. Of many security methods, which are able to protect the privacy, The Role-Based Access Control (RBAC) model, a typical access control model within the enterprise environment, has been widely studied, applied to various applications, and implemented. However, much existing research for access control has not solved the privacy concerns within ubiquitous computing. This paper proposes a method and framework of user-centric and efficient access control to handle personal privacy within ubiquitous computing environment by using both proposed model based on core component of RBAC model and privacy policies.

AB - The Ubiquitous computing Environment is an environment that freely shares all data anytime, anywhere, and through any device without considering constraints. However, the personal or private information in ubiquitous computing could be disclosed, shared from anyone, or used maliciously without consent from the owner of the data. Thus, Privacy is one of the major issues in such an environment. Of many security methods, which are able to protect the privacy, The Role-Based Access Control (RBAC) model, a typical access control model within the enterprise environment, has been widely studied, applied to various applications, and implemented. However, much existing research for access control has not solved the privacy concerns within ubiquitous computing. This paper proposes a method and framework of user-centric and efficient access control to handle personal privacy within ubiquitous computing environment by using both proposed model based on core component of RBAC model and privacy policies.

UR - http://www.scopus.com/inward/record.url?scp=34247197668&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=34247197668&partnerID=8YFLogxK

U2 - 10.1109/ICHIT.2006.253499

DO - 10.1109/ICHIT.2006.253499

M3 - Conference contribution

AN - SCOPUS:34247197668

SN - 0769526748

SN - 9780769526744

VL - 1

SP - 278

EP - 283

BT - Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006

ER -