A Semantic Context-Aware Access Control in Pervasive Environments

  • Hyuk Jin Ko
  • Dong Ho Won
  • Dong Ryul Shin
  • Hyun Seung Choo
  • Ung Mo Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3981)


Increasing trends in pervasive computing demonstrate a requirement for context awareness. The security problem has also become a key issue with context awareness. Access control should execute its decisions by capturing security-relevant context, such as time, location, user activity, and other environmental information available when the access requests arrive. In previous context-aware access control systems, a query issued by an authorized user could not be answered when the context specified in access control policy do not exactly match that specified in the query, even though both are semantically related. In this paper, Semantic Context-aware Access Control (SCAC), is proposed, to solve the problem mentioned prior. The proposed SCAC system takes contexts and its ontologies from context middleware and subsequently arranges contexts according to the abstraction level, to build context hierarchies. Using context hierarchies and reasoning rules extracted from the context ontologies, SCAC can overcome the semantic gap between contexts specified in the policy and contexts collected from the dynamic context sources in pervasive environments.


Access Control Inference Rule Pervasive Computing Access Control Policy Access Control Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Weiser, M.: Hot Topics: Ubiquitous Computing. In IEEE the computer (1993)Google Scholar
  2. 2.
    Bellavista, P., Corradi, A., Stefanelli, C.: The Ubiquitous Provisioning of Internet Services to Portable Devices. IEEE Pervasive Computing 1(3) (2002)Google Scholar
  3. 3.
    Moyer, M.J., Covington, M.J., Ahamad, M.: Generalized role-based access control for securing future applications. In: NISSC 2000 23rd National Information Systems Security Conference (2000)Google Scholar
  4. 4.
    Covington, M.J., Srinivasan, S., Dey, A., Ahamad, M., Long, W., Abowd, G.: Securing context-aware applications using environment roles. In: SACMAT 2001 (2001)Google Scholar
  5. 5.
    Adam, N.R., Atluri, V.: A Content-based Authorization Model for Digital Libraries. IEEE Transactions on knowledge and data engineering, 14(2) (2002)Google Scholar
  6. 6.
    Kumar, A., Karnik, N., Chafle, G.: Context Sensitivity in Role-based Access Control. Operating Systems Review. IBM Journal 36(3) (2002)Google Scholar
  7. 7.
    Li Q., Atluri, V.: Concept-level Access Control for the Semantic Web. In: ACM Workshop on XML Security (2003)Google Scholar
  8. 8.
    Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role Based Access Control Models. IEEE Computer, 29(2) (February 1996)Google Scholar
  9. 9.
    Sandhu, R., Samarati, P.: Access control: principles and practice. IEEE Communication Magazine, 32 (1994)Google Scholar
  10. 10.
    Sandhu, R., Ferraiolo, D., Kuhm, R.: The NIST Model for Role-Based Access Control: Towards A Unified Standard. In: Proceedings of the fifth ACM workshop on Role-based access control (2000)Google Scholar
  11. 11.
    Ranganathan, A., Campbell, R.H.: An Infrastructure for context-awareness based on first-order logic. In Personal and Ubiquitous Computing, 7(6) (2003)Google Scholar
  12. 12.
    Wang, X.H., Xhang, D.Q., Gu, T., Pung, H.K.: Ontology Based Context Modeling and Reasoning using OWL. In: PerCom 2004 Annual Conference on Pervasive computing and Communications Workshop (2004)Google Scholar
  13. 13.
    Bellifemine, F., Poggi, A., Rimassa, G.: Developing multi agent systems with a FIPA-compliant agent framework. In: Software - Practice & Experience. John Wiley & Sons, Ltd., Chichester (2001)Google Scholar
  14. 14.
    Haarslev, V., Möller, R.: Racer: A Core Inference Engine for the Semantic Web. In: Proceedings of the 2nd International Workshop on Evaluation of Ontology-based Tools (EON 2003), located at the 2nd International Semantic Web Conference ISWC 2003, Sanibel Island, Florida, USA, October 20 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Hyuk Jin Ko
    • 1
  • Dong Ho Won
    • 1
  • Dong Ryul Shin
    • 1
  • Hyun Seung Choo
    • 1
  • Ung Mo Kim
    • 1
  1. 1.School of Information and Communication EngineeringSungkyunkwan UniversitySuwon, Gyeonggi-doKorea

Personalised recommendations