Advertisement

A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments

  • Alessandra Toninelli
  • Rebecca Montanari
  • Lalana Kagal
  • Ora Lassila
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4273)

Abstract

Wireless connectivity and widespread diffusion of portable devices offer novel opportunities for users to share resources anywhere and anytime, and to form ad-hoc coalitions. Resource access control is crucial to leverage these ad-hoc collaborations. In pervasive scenarios, however, collaborating entities cannot be predetermined and resource availability frequently varies, even unpredictably, due to user/device mobility, thus complicating resource access control. Access control policies cannot be defined based on entity’s identities/roles, as in traditional access control solutions, or be specified a priori to face any operative run time condition, but require continuous adjustments to adapt to the current situation. To address these issues, this paper advocates the adoption of novel access control policy models that follow two main design guidelines: context-awareness to control resource access on the basis of context visibility and to enable dynamic adaptation of policies depending on context changes, and semantic technologies for context/policy specification to allow high-level description and reasoning about context and policies. The paper also describes the design of a semantic context-aware policy model that adopts ontologies and rules to express context and context-aware access control policies and supports policy adaptation.

Keywords

Access Control Description Logic Aggregation Rule Access Control Policy Access Control Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Dey, A., Abowd, G., Salber, D.: A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Human-Computer Interaction 16, 97–166 (2001)CrossRefGoogle Scholar
  2. 2.
    Sandu, R., et al.: Role based access control models. IEEE Computer 29(2) (February 1996)Google Scholar
  3. 3.
    Liscano, R., Wang, K.: A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing. In: Proceedings of the Second Annual Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005). IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  4. 4.
    Georgiadis, C.K., et al.: Flexible Team-Based Access Control Using Contexts. In: Proc. of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, Virginia, USA, May 3-4. ACM Press, New York (2001)Google Scholar
  5. 5.
    Gong, L.: Inside Java 2 Platform Security. Addison-Wesley, Reading (1999)Google Scholar
  6. 6.
    Lassila, O., Khushraj, D.: Contextualizing Applications via Semantic Middleware. In: Proc. of the Second Annual Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005). IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  7. 7.
    Toninelli, A., Kagal, L., Bradshaw, J.M., Montanari, R.: Rule-based and Ontology-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments. In: Proc. of the Semantic Web and Policy Workshop (SWPW), in conj. with ISWC 2005, Galway, Ireland, November 7 (2005)Google Scholar
  8. 8.
    Covington, M.J., et al.: Securing Context-Aware Applications Using Environmental Roles. In: Proc. of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, Virginia, USA, May 3-4. ACM Press, New York (2001)Google Scholar
  9. 9.
    Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic Web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 419–437. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Uszok, A., et al.: KAoS policy management for semantic web services. IEEE Intelligent Systems 19(4), 32–41 (2004)CrossRefGoogle Scholar
  11. 11.
    Kagal, L., Finin, T., Joshi, A.: A Policy Language for Pervasive Computing Environment. In: Proc. of IEEE Fourth International Workshop on Policy (Policy 2003), Lake Como, Italy, June 4-6, 2003, pp. 63–76. IEEE Computer Society Press, Los Alamitos (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Alessandra Toninelli
    • 1
  • Rebecca Montanari
    • 1
  • Lalana Kagal
    • 2
  • Ora Lassila
    • 3
  1. 1.Dipartimento di ElettronicaInformatica e Sistemistica Università di BolognaBolognaItaly
  2. 2.MIT CSAILCambridgeUSA
  3. 3.Nokia Research Center CambridgeCambridgeUSA

Personalised recommendations