User-Centric Adaptive Access Control and Resource Configuration for Ubiquitous Computing Environments

White, Michael and Jennings, Brendan and Van der Meer, Sven (2005) User-Centric Adaptive Access Control and Resource Configuration for Ubiquitous Computing Environments. INSTICC, p. 349.

[img]
Preview
PDF
vdm2005c-iceis.pdf

Download (215kB) | Preview

Abstract

Provision of adaptive access control is key to allowing users harness the full potential of ubiquitous computing environments. In this paper, we introduce the M-Zones Access Control (MAC) process, which provides user-centric attribute-based access control, together with automatic reconfiguration of resources in response to the changes in the set of users physically present in the environment. User control is realised via user-specified policies, which are analysed in tandem with system policies and policies of other users, whenever events occur that require policy decisions and associated configuration operations. In such a system users' policies may habitually conflict with system policies, or indeed other users' policies; thus, policy conflict detection and resolution is a critical issue. To address this we describe a conflict detection/resolution method based on a policy precedence scheme. To illustrate the operation of the MAC process and its conflict detection/resolution method, we discuss its realisation in a test bed emulating an office-based ubiquitous computing environment.

Item Type: Book
Additional Information: NOT IN FILE Miami, U.S.A.
Uncontrolled Keywords: Access Control,Policy Based Management,Conflict Detection and Resolution,Ubiquitous Computing.
Departments or Groups: Telecommunications Software and Systems Group
Divisions: School of Science
Date Deposited: 16 Oct 2007 17:29
Last Modified: 22 Aug 2016 10:25
URI: http://repository.wit.ie/id/eprint/669

Actions (login required)

View Item View Item