Requirements Analysis for Access Control Model on Ubiquitous Computing Environment


The KIPS Transactions:PartA, Vol. 11, No. 7, pp. 563-570, Dec. 2004
10.3745/KIPSTA.2004.11.7.563,   PDF Download:

Abstract

Ubiquitous computing environment requires strong security and privacy. Access control is one of security areas. Access control on Ubiquitous computing is different from it on traditional information systems so that traditional access control models are not suitable for Ubiquitous computing environment. This research defines Ubiquitous computing environment as an access control point of view, and shows requirements to consider for developing access control model for Ubiquitous computing environment. It also brings up three implementing types of access control on Ubiquitous computing environment.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. J. Oh and J. H. Park, "Requirements Analysis for Access Control Model on Ubiquitous Computing Environment," The KIPS Transactions:PartA, vol. 11, no. 7, pp. 563-570, 2004. DOI: 10.3745/KIPSTA.2004.11.7.563.

[ACM Style]
Se Jong Oh and Je Ho Park. 2004. Requirements Analysis for Access Control Model on Ubiquitous Computing Environment. The KIPS Transactions:PartA, 11, 7, (2004), 563-570. DOI: 10.3745/KIPSTA.2004.11.7.563.