Context-Role Based Access Control for Context-Aware Application

  • Seon-Ho Park
  • Young-Ju Han
  • Tai-Myoung Chung
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4208)


The rapid growth of wireless network technology and the deployment of mobile computing devices have enabled the construction of pervasive computing environment. In pervasive computing environment, it is proliferated that many new applications that provide active and intelligent services by context information are collected by pervasive sensor devices. These new applications called context-aware applications must require new security mechanisms and policies different from typical ones. Specially, access control mechanism supports security policy that is based on context information, in order to provide automating context-aware services. So, this paper analyzes various access control mechanisms and proposes a context-role based access control mechanism for context-aware application.


Access Control Context Information Security Policy Policy Rule Access Control Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ahuja, V., Halaharvi, V.: Network and Internet Security. IANE Publishing Company (1999)Google Scholar
  2. 2.
    Zhang, G., Parashar, M.: Context-aware dynamic access control for pervasive computing. In: 2004 Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004), San Diego, California, USA (January 2004)Google Scholar
  3. 3.
    Convington, M.J., Long, W., et al.: Securing Context-Aware Applications Using Environment Roles. In: SACMAT 2001, Chantilly, Virginia, USA, May 3-4 (2001)Google Scholar
  4. 4.
    Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control. Artech House (2003)Google Scholar
  5. 5.
    Sandhu, R.S., Coyne, E.J., et al.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)Google Scholar
  6. 6.
    Sandhu, R.S.: Role based access control. Advances in Computers, vol. 46. Academic Press, London (1998)Google Scholar
  7. 7.
    Ferraiolo, D.F., Sandhu, R., et al.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security 4(3) (2001)Google Scholar
  8. 8.
    Moyer, M.M., Convington, M.J., et al.: Generalized role-based access control for securing future applications. In: 23rd National Information Systems Security Conference (NISSC 2000), Baltimore, Md, USA (October 2000)Google Scholar
  9. 9.
    Moyer, M.J., Ahamad, M.: Generalized role based access control. In: Proceedings of the 2001 International Conference on Distributed Computing Systems (ICDCS), Mesa, AZ (April 2001)Google Scholar
  10. 10.
    Korkea-aho, M.: Context-Aware Applications Survey. In: Internetworking Seminar (April 2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Seon-Ho Park
    • 1
  • Young-Ju Han
    • 1
  • Tai-Myoung Chung
    • 2
  1. 1.Internet Management Technology Laboratory, Department of Computer EngineeringSungKyunKwan UniversitySuwonKorea
  2. 2.School of Information & Communication EngineeringSungkyunkwan UniversitySuwonKorea

Personalised recommendations