Abstract
Wireless connectivity and widespread diffusion of portable devices offer novel opportunities for users to share resources anywhere and anytime, and to form ad-hoc coalitions. Resource access control is crucial to leverage these ad-hoc collaborations. In pervasive scenarios, however, collaborating entities cannot be predetermined and resource availability frequently varies, even unpredictably, due to user/device mobility, thus complicating resource access control. Access control policies cannot be defined based on entity’s identities/roles, as in traditional access control solutions, or be specified a priori to face any operative run time condition, but require continuous adjustments to adapt to the current situation. To address these issues, this paper advocates the adoption of novel access control policy models that follow two main design guidelines: context-awareness to control resource access on the basis of context visibility and to enable dynamic adaptation of policies depending on context changes, and semantic technologies for context/policy specification to allow high-level description and reasoning about context and policies. The paper also describes the design of a semantic context-aware policy model that adopts ontologies and rules to express context and context-aware access control policies and supports policy adaptation.
Chapter PDF
References
Dey, A., Abowd, G., Salber, D.: A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Human-Computer Interaction 16, 97–166 (2001)
Sandu, R., et al.: Role based access control models. IEEE Computer 29(2) (February 1996)
Liscano, R., Wang, K.: A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing. In: Proceedings of the Second Annual Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005). IEEE Computer Society Press, Los Alamitos (2005)
Georgiadis, C.K., et al.: Flexible Team-Based Access Control Using Contexts. In: Proc. of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, Virginia, USA, May 3-4. ACM Press, New York (2001)
Gong, L.: Inside Java 2 Platform Security. Addison-Wesley, Reading (1999)
Lassila, O., Khushraj, D.: Contextualizing Applications via Semantic Middleware. In: Proc. of the Second Annual Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005). IEEE Computer Society Press, Los Alamitos (2005)
Toninelli, A., Kagal, L., Bradshaw, J.M., Montanari, R.: Rule-based and Ontology-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments. In: Proc. of the Semantic Web and Policy Workshop (SWPW), in conj. with ISWC 2005, Galway, Ireland, November 7 (2005)
Covington, M.J., et al.: Securing Context-Aware Applications Using Environmental Roles. In: Proc. of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, Virginia, USA, May 3-4. ACM Press, New York (2001)
Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic Web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 419–437. Springer, Heidelberg (2003)
Uszok, A., et al.: KAoS policy management for semantic web services. IEEE Intelligent Systems 19(4), 32–41 (2004)
Kagal, L., Finin, T., Joshi, A.: A Policy Language for Pervasive Computing Environment. In: Proc. of IEEE Fourth International Workshop on Policy (Policy 2003), Lake Como, Italy, June 4-6, 2003, pp. 63–76. IEEE Computer Society Press, Los Alamitos (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Toninelli, A., Montanari, R., Kagal, L., Lassila, O. (2006). A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments. In: Cruz, I., et al. The Semantic Web - ISWC 2006. ISWC 2006. Lecture Notes in Computer Science, vol 4273. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11926078_34
Download citation
DOI: https://doi.org/10.1007/11926078_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49029-6
Online ISBN: 978-3-540-49055-5
eBook Packages: Computer ScienceComputer Science (R0)