USER-CENTRIC ADAPTIVE ACCESS CONTROL AND RESOURCE CONFIGURATION FOR UBIQUITOUS COMPUTING ENVIRONMENTS

Mike White, Brendan Jennings, Sven van der Meer

Abstract

Provision of adaptive access control is key to allowing users harness the full potential of ubiquitous computing environments. In this paper, we introduce the M-Zones Access Control (MAC) process, which provides user-centric attribute-based access control, together with automatic reconfiguration of resources in response to the changes in the set of users physically present in the environment. User control is realised via user-specified policies, which are analysed in tandem with system policies and policies of other users, whenever events occur that require policy decisions and associated configuration operations. In such a system users’ policies may habitually conflict with system policies, or indeed other users’ policies; thus, policy conflict detection and resolution is a critical issue. To address this we describe a conflict detection/resolution method based on a policy precedence scheme. To illustrate the operation of the MAC process and its conflict detection/resolution method, we discuss its realisation in a test bed emulating an office-based ubiquitous computing environment.

References

  1. Barrett K., Carroll R., Osmani V. and van der Meer S. (2004), User-centric Management of Ubiquitous Environments: Challenges and Initial Solutions, in Wade V. (ed), Proc. 2nd Int'l Workshop on Managing Ubiquitous Communications and Services (MUCS 2004), Dublin, Ireland, December 2004;
  2. Corradi A., Montanari R. and Tibaldi D. (2004), Contextbased Access Control Management in Ubiquitous Environments, Proc. Third IEEE Int. Symp. on Network Computing and Applications (NCA'04), 253-260;
  3. Dunlop N., Indulska J. and Raymond K. (2003), Methods for Conflict Resolution in Policy-Based Management Systems, in Proc. 7th IEEE International Enterprise Distributed Object Computing Conference (EDOC'2003), Brisbane, Sept 2003, 98-109;
  4. Ghamri-Doudane S., van der Meer S., O'Connor R., Ghamri-Doudane Y. and Agoulmine N. (2004), Resources Discovery and Management Using Policies in Smart Spaces, in Proc. Workshop of the 11th HP OpenView University Association (HPOVUA 2004), Paris, June 2004;
  5. Godik S., Moses T. (eds.) (2003), eXtensible Access Control Markup Language (XACML) Version 1.0, OASIS Standard, available (15/2/2005): http://www.oasis-open.org;
  6. Kagal L., Finin T. and Joshi A. (2001), Trust-Based Security in Pervasive Computing Environments, IEEE Computer, 34(12):154-157;
  7. Lepro R. (2003), Cardea: Dynamic Access Control in Distributed Systems, NAS Technical Report NAS-03-020;
  8. Lupu E. C. and Sloman M. (1999), Conflicts in Policybased Distributed Systems Management, IEEE Trans. on Software Engineering, 25(6):852-868;
  9. M-Zones research programme, information available (15/2/2005): http://www.m-zones.org;
  10. Sampemane G., Naldurg P. and Campbell R. (2002), Access Control for Active Spaces, Proc. 18th Annual Computer Security Applications Conference, 343-352;
  11. Sun Microsystems (2005), SunXACML Implementation, information available (15/2/2005): http://sunxacml.sourceforge.net;
  12. TSSG/O2 Home of the Future Smart Home Demonstration, information available (15/2/2005): http://www.o2home.com;
  13. Ubisense Ltd. (2005), Ubisense Product Description: Simulator Module, Information available (15/2/2005): http://ubisense.net/Software/Simulate%20environment s.htm.
Download


Paper Citation


in Harvard Style

White M., Jennings B. and van der Meer S. (2005). USER-CENTRIC ADAPTIVE ACCESS CONTROL AND RESOURCE CONFIGURATION FOR UBIQUITOUS COMPUTING ENVIRONMENTS . In Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 972-8865-19-8, pages 349-354. DOI: 10.5220/0002578103490354


in Bibtex Style

@conference{iceis05,
author={Mike White and Brendan Jennings and Sven van der Meer},
title={USER-CENTRIC ADAPTIVE ACCESS CONTROL AND RESOURCE CONFIGURATION FOR UBIQUITOUS COMPUTING ENVIRONMENTS},
booktitle={Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2005},
pages={349-354},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002578103490354},
isbn={972-8865-19-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - USER-CENTRIC ADAPTIVE ACCESS CONTROL AND RESOURCE CONFIGURATION FOR UBIQUITOUS COMPUTING ENVIRONMENTS
SN - 972-8865-19-8
AU - White M.
AU - Jennings B.
AU - van der Meer S.
PY - 2005
SP - 349
EP - 354
DO - 10.5220/0002578103490354