uiH-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment

  • Jong Hyuk Park
  • Sangjin Lee
  • Byoung-Soo Koh
  • Jae-Hyuk Jang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4252)


In this paper, we propose a uiH-PMAC (ubi-intelligent Home – Privilege Management Access Control) model which is suitable to access control of ubiquitous intelligent environment. The model considers the temporary limit conditions as access control of home device or user location information considering the characteristics of members who could limit the use of resource. In addition, the model provides authentication policy which authenticates not only devices but also domains and access control policy which considers inheritance of role. Finally, the model can be applied various and scalable access control policies which are suitable to the characteristics of intelligent digital environment as considering the user location information as a temporary limit condition.


Access Control Security Policy Access Control Policy Access Control Model Security Class 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Weiser, M.: The Computer for the 21st Century, pp. 94–104. Scientific American (1991)Google Scholar
  2. 2.
    Park, J.H., Park, H.-S., Lee, S., Jun-Choi: Intelligent Multimedia Service System Based on Context Awareness in Smart Home. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3681, pp. 1146–1152. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Satya, M.: IEEE Pervasive Computing Magazine,
  4. 4.
    Park, J.H., Jun-Choi, Lee, S., Park, H.-U., Lee, D.-G.: User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3801, pp. 313–320. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Stajano, F.: Security for Ubiquitous Computing. Wiley, Chichester (2002)CrossRefGoogle Scholar
  6. 6.
    Ferraiolo, D.F., Kuhn, D.R.: Role-based access controls. In: 15th NIST-NCSC National Computer Security Conference, Baltimore, pp. 554–563 (1992)Google Scholar
  7. 7.
    Tassey, G., Gallaher, M.P., O’Connor, A.C., Kropp, B.: The Economic Impact of Role-Based Access Control, NIST Planning Report 02-1 (2002)Google Scholar
  8. 8.
    Oh, S., Park, S.: Task-Role Based Access Control (T-RBAC): An Improved Access Control Model for Enterprise Environment. In: Ibrahim, M., Küng, J., Revell, N. (eds.) DEXA 2000. LNCS, vol. 1873, Springer, Heidelberg (2000)CrossRefGoogle Scholar
  9. 9.
    Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.: A Generalized Temporal Role-Based Access Control Model. IEEE Transactions On Knowledge And Data Engineering 17(1) (2005)Google Scholar
  10. 10.
    Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A Temporal Role-Based Access Control Model. ACM Transaction on Information and System Security (TISSEC) 4(3), 191–233 (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jong Hyuk Park
    • 1
  • Sangjin Lee
    • 1
  • Byoung-Soo Koh
    • 2
  • Jae-Hyuk Jang
    • 3
  1. 1.Center for Information Security TechnologiesKorea UniversitySeoulKorea
  2. 2.DigiCAPs Co., Ltd.SeoulKorea
  3. 3.Division of Computer EngineeringDaejon UniversityDaejonKorea

Personalised recommendations