Skip to main content

Semantic Access Control for Corporate Mobile Devices

  • Conference paper
Algorithms and Architectures for Parallel Processing (ICA3PP 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6082))

Abstract

Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally distributed between peers and partners. Designing applicable access control mechanisms in this environment is difficult from the point of traditional security measures. Semantic web technologies offer appropriate access opportunities to the corporate resources by using related context in user devices and servers under the trust philosophy. Semantic web technology combines user requests and service descriptions for an efficient matchmaking. This paper examines various access control mechanisms and semantically analyzes them. The purpose of this paper is to present a more secure access control mechanism for mobile corporate devices. This model can be used as an additional security framework that enforces access control mechanisms in the organizations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Veijalainen, J.: Developing mobile ontologies; who, why, where, and how? In: Mobile Services oriented Architectures and Ontologies Workshop, MoSO 2007 (2007)

    Google Scholar 

  2. Kalaoja, J., Kantorovitch, J., Carro, S., Miranda, J.M., Ramos, A., INSTICC: The vocabulary ontology engineering for the semantic modelling of home services. In: 8th International Conference on Enterprise Information Systems (ICEIS 2006), May 23-27 (2006)

    Google Scholar 

  3. Doulkeridis, C., Vazirgiannis, M.: Querying and updating a context-aware service directory in mobile environments. In: WI 2004 IEEE/WIC/ACM International Conference on Web Intelligence, September 20-24 (2004)

    Google Scholar 

  4. Jou, C.: A semantics-based automatic web content adaptation framework for mobile devices. Web Information Systems and Technologies, 230–242 (2008)

    Google Scholar 

  5. Corradi, A., Montanari, R., Toninelli, A., IEEE Computer, S.: Adaptive semantic support provisioning in Mobile Internet environments. In: International Symposium on Applications and the Internet (SAINT 2005), Janaury 31-February 04 (2005)

    Google Scholar 

  6. Weissenberg, N., Gartmann, R., Voisard, A.: An ontology-based approach to personalized situation-aware mobile service supply. Geoinformatica 10(1), 55–90 (2006)

    Article  Google Scholar 

  7. Drogehorn, O., Wust, B., David, K., IEEE: Personalised applications and services for a mobile user. In: International Symposium on Autonomous Decentralized Systems (ISADS 2005), April 4-8 (2005)

    Google Scholar 

  8. Bianchini, D., De Antonellis, V., Melchiori, M., Salvi, D.: Lightweight ontology-based service discovery in mobile environments. In: Seventeenth International Conference on Database and Expert Systems Applications, Proceedings, pp. 359–364 (2006)

    Google Scholar 

  9. Faro, A., Giordano, D., Musarra, A., IEEE, I.: Ontology based intelligent mobility systems. In: IEEE International Conference on Systems, Man and Cybernetics, vol. 1-5, pp. 4288–4293 (2003)

    Google Scholar 

  10. Villanueva, F.J., Villa, D., Barba, J., Rincon, F., Moya, F., Lopez, J.C.: Ontology access patterns for pervasive computing environments. In: Mikulecky, P., Liskova, T., Cech, P., Bures, V. (eds.) Ambient Intelligence Perspectives, pp. 236–244 (2009)

    Google Scholar 

  11. Crampton, J., Lim, H.W.: Role signatures for access control in open distributed systems. In: 23rd International Information Security Conference held at the 20th World Computer Congress, September 07-10 (2008)

    Google Scholar 

  12. Oostendorp, K.A., Badger, L., Vance, C.D., Morrison, W.G., Petkac, M.J., Sherman, D.L., Sterne, D.F., IEEE Comp. Soc.: Domain and type enforcement firewalls (1997)

    Google Scholar 

  13. Pan, L., Zhang, C.N.: A Criterion-Based Multilayer Access Control Approach for Multimedia Applications and the Implementation Considerations. ACM Transactions on Multimedia Computing Communications and Applications 5(2) (2008)

    Google Scholar 

  14. Lee, G.H., Yeh, H.J., Kim, W.I., Kim, D.K.: Web security using distributed role hierarchy. In: 2nd International Workshop on Grid and Cooperative Computing, December 07-10 (2003)

    Google Scholar 

  15. Yamazaki, W., Hiraishi, H., Mizoguchi, F., IEEE Computer, S.: Designing an agentbased RBAC system for dynamic security policy. In: 13th IEEE International Workshop on Enabling Technologies - Infrastructure for Collaborative Enterprises, June 14-16 (2004)

    Google Scholar 

  16. Al-Kahtani, M.A., Sandhu, R., IEEE Computer Society, I.C.S.: A model for attributebased user-role assignment. In: 18th Annual Computer Security Applications Conference, December 09-13 (2002)

    Google Scholar 

  17. Carminati, B., Ferrari, E., Tan, K.L., ACM: Enforcing Access Control Over Data Streams. In: 12th ACM Symposium on Access Control Models and Technologies, June 20-22 (2007)

    Google Scholar 

  18. Park, J.S., Ahn, G.J., Sandhu, R.: Role-based access control on the web using LDAP. Database and Application Security XV, 19–30 (2002)

    Google Scholar 

  19. Schwartmann, D.: An attributable role-based access control for healthcare. In: Bubak, M., DickVanAlbada, G., Sloot, P.M.A., Dongarra, J.J. (eds.), pp. 1148–1155 (2004)

    Google Scholar 

  20. Greenhalgh, C., Glover, K., Humble, J., Robinson, J., Wilson, S., Frey, J., Page, K., De Roure, D., IEEE: Combining System Introspection with User-Provided Description to Support Configuration and Understanding of Pervasive systems. In: 3rd International Conference on Pervasive Computing and Applications, October 06-08 (2008)

    Google Scholar 

  21. Hung, L.X., Lee, S., Lee, Y.K., Lee, H.: Activity-based access control model to hospital information. In: 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, August 21-24 (2007)

    Google Scholar 

  22. Jung, J.J., Lee, H., Choi, K.S.: Towards Efficient Reality Mining with Contexts and Semantics: a Case Study of Telecommunication. In: 2nd International Symposium on Intelligent Information Technology Application, December 21-22 (2008)

    Google Scholar 

  23. Naudet, Y., Aghasaryan, A., Toms, Y., Senot, C.: An Ontology-based Profiling and Recommending System for Mobile TV. In: 3rd International Workshop on Semantic Media Adaptation and Personalization (SMAP 2008), December 15-16 (2008)

    Google Scholar 

  24. Martins, D.S., Santana, L.H.Z., Biajiz, M., do Prado, A.F., de Souza, W.L., ACM: Context-aware Information Retrieval on a Ubiquitous Medical Learning Environment. In: 23rd Annual ACM Symposium on Applied Computing, March 16-20 (2008)

    Google Scholar 

  25. Mena, E., Illarramendi, A., Royo, J.A., Goni, A.: A Software Retrieval Service Based on Adaptive Knowledge-Driven Agents for Wireless Environments. ACM Transactions on Autonomous and Adaptive Systems 1(1), 67–90 (2006)

    Article  Google Scholar 

  26. Hu, D.H., Dong, F., Wang, C.L., IEEE Computer, S.O.C.: A Semantic Context Management Framework on Mobile Device. In: 6th International Conference on Embedded Software and Systems, May 25-27 (2009)

    Google Scholar 

  27. Yuan, E., Tong, J., IEEE Comp. Soc: Attributed based access control (ABAC) for web services. In: IEEE International Conference on Web Services, Proceedings, July 11-15, vol. 1,2 (2005)

    Google Scholar 

  28. Benantar, M.: Access Control Systems Security, Identity Management and Trust Models. Springer Science Business Media, Heidelberg (2006)

    MATH  Google Scholar 

  29. Yuan, E., Tong, J.: Attribute Based Access Control - A New Access Control Approach for Service Oriented Architecture (SOA). In: New Challenges for Access Control Workshop (2005)

    Google Scholar 

  30. Cuppens, F., Miège, A.: Modelling Contexts in the Or-BAC Model. In: 19th Annual Computer Security Applications Conference (2003)

    Google Scholar 

  31. Jung, J.J., Park, S.B., Jo, G.S.: Semantic template generation based information summarization for mobile devices. In: Shimojo, S., Ichii, S., Ling, T.-W., Song, K.-H. (eds.) HSI 2005. LNCS, vol. 3597, pp. 135–143. Springer, Heidelberg (2005)

    Google Scholar 

  32. Lau, B.Y.S., Pham-Nguyen, C., Lee, C.S., Garlatti, S., IEEE: Semantic Web Service Adaptation Model for a Pervasive Learning Scenario. In: 2nd IEEE Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, July 12-13 (2008)

    Google Scholar 

  33. Niazi, R., Mahmoud, Q.H., IEEE.: An Ontology-Based Framework for Discovering Mobile Services. In: 7th Annual Conference on Communication Networks and Services Research, May 11-13 (2009)

    Google Scholar 

  34. Csorba, K., Vajk, I.: Iterative Search for Similar Documents on Mobile Devices. In: Dengel, A.R., Berns, K., Breuel, T.M., Bomarius, F., Roth-Berghofer, T.R. (eds.) KI 2008. LNCS (LNAI), vol. 5243, pp. 38–45. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  35. Makela, E., et al.: Enabling the semantic web with ready-to-use web widgets. In: Proceedings of the First Industrial Results of Semantic Technologies Workshop, ISWC 2007 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ercan, T., Yıldız, M. (2010). Semantic Access Control for Corporate Mobile Devices. In: Hsu, CH., Yang, L.T., Park, J.H., Yeo, SS. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2010. Lecture Notes in Computer Science, vol 6082. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13136-3_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13136-3_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13135-6

  • Online ISBN: 978-3-642-13136-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics