Distributed Processing of Context-Aware Authorization in Ubiquitous Computing Environments

  • Young-Chul Shim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3981)


Context-awareness and security are critical issues in ubiquitous computing. In this paper we present a framework for context-aware authorization in ubiquitous computing environments. We present an architecture consisting of authorization infrastructure and context infrastructure. The context infrastructure provides context information and the authorization infrastructure makes decisions to grant access rights based on context-aware authorization policies and context information. This paper also describes how multiple nodes in distributed environments cooperate to perform evaluation and detection of context constraints and events included in authorization policies.


Sensor Network Inference Engine Access Request Context Constraint Context Object 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Hong, J.I., Landay, J.A.: An Infrastructure Approach to Context-Aware Computing. HCI Journal 16(2-3) (2001)Google Scholar
  2. Judd, G., Steenkiste, P.: Providing Contextual Information to Pervasive Computing Application. In: IEEE PerCom 2003 (2003)Google Scholar
  3. Al-Muhtadi, J., et al.: Cerberus: A Context-Aware Security Scheme for Smart Spaces. In: IEEE PerCom 2003 (2003)Google Scholar
  4. Hoagland, J.A., et al.: Security Policy Specification using a Graphical Approach, Technical Report CSE-98-3, UC Davis Computer Science Dept. (July 1998)Google Scholar
  5. Ortalo, R.: A Flexible Method for Information System Security Policy Specification. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 67–85. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  6. Damianou, N., et al.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18–39. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. Ranganathan, A., Campbell, R.H.: An infrastructure for context-Awareness based on First Order Logic. Pers. Ubiquit. Computing 7, 353–364 (2003)CrossRefGoogle Scholar
  8. Covington, M.J., et al.: Securing Context-Aware Applications using Environment Roles. In: SACMAT 2001 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Young-Chul Shim
    • 1
  1. 1.Department of Computer EngineeringHongik UniversitySeoulKorea

Personalised recommendations