Metrika

  • citati u SCIndeksu: [1]
  • citati u CrossRef-u:0
  • citati u Google Scholaru:[]
  • posete u poslednjih 30 dana:0
  • preuzimanja u poslednjih 30 dana:0

Sadržaj

članak: 4 od 8  
Back povratak na rezultate
2012, vol. 11, br. 41, str. 33-39
Kontekstno zavisna kontrola pristupa
Univerzitet u Novom Sadu, Fakultet tehničkih nauka

e-adresasladicg@uns.ac.rs, mbranko@uns.ac.rs, ftn_zora@uns.ac.rs
Ključne reči: kontrola pristupa; RBAC; kontekstno zavisna kontrola pristupa; kontekst; kontekstno zavisno računarstvo
Sažetak
U današnjem dobu informacionih tehnologija kontrola pristupa, obično, razmatra na koji način korisnici mogu pristupati resursima računarskog sistema ili 'ko šta može da radi'. Kontrola pristupa predstavlja, neosporivo, osnovni sigurnosni mehanizam koji je danas u upotrebi. Tradicionalni modeli kontrole pristupa, poput RBAC-a (Role Based Access Control), ne razmatraju uticaj kontekstualnih informacija prilikom definisanja i sprovođenja kontrole pristupa. Stoga, ovi modeli u određenim slučajevima korišćenja nisu adekvatni za definisanje i sprovođenje kontrole pristupa. Kontekstno zavisna kontrola pristupa eksplicitno razmatra kontekst (stanje okruženja) u specifikaciji i implementaciji mehanizama kontrole pristupa. Većina istraživanja u ovoj oblasti bazirana je na ekstenziji RBAC modela u cilju da podrži kontekstno zavisnu kontrolu pristupa. U radu je dat prikaz odabranih kontekstno zavisnih modela za kontrolu pristupa koji se primenjuju u različitim oblastima.
Reference
Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P. (1999) Towards a better understanding of context and context-awareness. u: International symposium on Handheld and ubiquitous computing (I), HUC 99, proceedings, London: Springer-Verlag, str. 304-307
Bacon, J., Moody, K., Yao, W. (2002) A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security, 5(4): 492-540
Bao, Y., Song, J., Wang, D., Shen, D., Yu, G. (2008) A role and context based access control model with UML. u: International Conference for Young Computer Scientists, pp. 1175-1180
Bhatti, R., Ghafoor, A., Bertino, E., Joshi, J.B.D. (2005) X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control. ACM Transactions on Information and System Security, 8(2): 187-227
Brezillon, P., Kouadri, M.G. (2004) Context-based security policies: a new modeling approach. u: PERCOMW ’04 - Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Proceedings, p. 154
Buchholz, T., Kupper, A., Schiffers, M. (2003) Quality of context: What it is and why we need it. u: Workshop of the HP Open View University Association (HPOVUA 2003), Proceedings
Cholewka, D., Botha, R., Eloff, J. (2000) A contextsensitive access control model and prototype implementation. u: IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures, Proceedings, pp. 341-350
Corradi, A., Montanari, R., Tibaldi, D. (2004) Context-based access control for ubiquitous service provisioning. u: 28th Annual International Computer Software and Applications Conference (COMPSAC), Proceedings, pp. 444-451
Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D. (2001) Securing context-aware applications using environment roles. u: ACM symposium on access control models and technologies (SACMAT) (VI), proceedings, New York: ACM, str. 10-20
Dey, A.K. (2000) Providing architectural support for building context-aware applications. Georgia, USA: Georgia Institute of Technology, PhD thesis
Emami, S., Amini, M., Zokaei, S. (2007) A context-aware access control model for pervasive computing environments. u: IEEE International Conference on Intelligent Pervasive Computing (IPC), Proceedings, pp. 51-56
Feng, X., Jun, X., Hao, H., Li, X. (2004) Context-aware role-based access control model for web services. u: Grid and cooperative computing GCC 2004 workshops, international workshop on information security and survivability for grid, 3252, 430-436
Fernandez, E., Larrondo-Petrie, M., Escobar, A. (2007) Contexts and contextbased access control. u: 3rd International Conference on Wireless and Mobile Communications (ICWMC), Proceedings, pp. 73-78
Ferraiolo, D.R., Kuhn, D.R., Chandramouli, R. (2003) Role-based access control. Artech House
Filho, J.B., Martin, H. (2008) Using context quality indicators for improving context-based access control in pervasive environments. u: IEEE/IFIP international conference on embedded and ubiquitous computing, EUC 08, proceedings, Washington: IEEE Computer Society, str. 285-290
Freudenthal, E., Pesin, T., Port, L., Keenan, E., Karamcheti, V. (2002) dRBAC: Distributed role-based access control for dynamic coalition environments. u: International Conference on Distributed Computing Systems, volume p. 411
Georgiadis, C.K., Mavridis, I., Pangalos, G., Thomas, R.K. (2001) Flexible team-based access control using contexts. u: ACM symposium on access control models and technologies (VI), SACMAT 01, proceedings, New York: ACM, str. 21-27
Gostojic, S., Sladic, G., Milosavljevic, B., Konjovic, Z. (2012) Context-Sensitive Access Control Model for Government Services. Journal of Organizational Computing and Electronic Commerce, vol. 22, br. 2, str. 184-213
Haibo, S., Fan, H. (2005) A context-aware role-based access control model for web services. u: IEEE international conference on e-business engineering, ICEBE, proceedings, 220-223
Han, W., Zhang, J., Yao, X. (2005) Context sensitive access control model and implementation. u: 5th International Conference on Computer and Information Technology (CIT), Proceedings, pp. 757-763
Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A. (2005) A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering, 17(1): 4-23
Kapsalis, V., Hadellis, L., Karelis, D., Koubias, S. (2006) A dynamic context-aware access control architecture for e-services. Computers & Security, 25(7): 507-521
Kouadri, M.G.K.G., Brezillon, P. (2003) A generic framework for context-based distributed authorizations. u: 4th International and Interdisciplinary Conference on Modeling and Using Context (Context 03), pp. 204-217
Kumar, A., Karnik, N., Chafle, G. (2002) Context sensitivity in role-based access control. ACM SIGOPS Operating Systems Review, 36(3): 53-66
Li, Y., Hong, J., Landay, J. (2003) Context map: Modeling scenes of the real world for context-aware computing. u: Ubiquitous Computing (Ubi-Comp2003), 5th Int. Conf
Liscano, R., Wang, K. (2007) A context-based delegation access control model for pervasive computing. u: 21st International Conference on Advanced Information Networking and Applications Workshops - AINAW ’07, Proceedings, pp. 44-51
Mostefaoui, K.G. (2003) Security in pervasive environments, what's next?. u: International Conference on Security and Management(SAM'03), proceedings, pp. 93-96
Mostefaoui, K.G., Brezillon, P. (2004) Modeling context-based security policies with contextual graphs. u: Second IEEE Annual Conference on Pervasive Computing and Communications Workshops - PERCOMW, Proceedings, p. 28, 04
Najar, S., Saidani, O., Kirsch-Pinheiro, M., Souveyet, C., Nurcan, S. (2009) Semantic representation of context models: A framework for analyzing and understanding. u: CIAO ’09 - 1st Workshop on Context, Information and Ontologies, Proceedings, pp. 1-10
Park, M., Gu, M.S., Ryu, K.H. (2007) Context information model using ontologies and rules based on spatial object. u: Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, pp. 107-114
Pigeot, C.E., Gripay, Y., Scuturici, M., Pierson, J.M. (2007) Context-sensitive security framework for pervasive environments. u: ECUMN'07 Fourth European Conference on Universal Multiservice Networks, Proceedings, pp. 391-400
Schilit, B., Adams, N., Want, R. (1994) Context-aware computing applications. u: Proc of IEEE workshop on mobile computing systems and applications, Washington: IEEE Computer Society, str. 85-91
Shang, C., Yang, Z., Liu, Q., Zhao, C. (2008) A context based dynamic access control model for web service. u: International conference on embedded and ubiquitous computing, IEEE/IFIP, Los Alamitos, CA, USA, IEEE Computer Society, vol. 2, str. 339-343
Sladić, G. (2012) Model kontekstno zavisne kontrole pristupa u poslovnim sistemima. Novi Sad: Fakultet tehničkih nauka, doktorska disertacija
Strang, T., Linnhoff-Popien, C. (2004) A context modeling survey. u: UbiComp 2004 - The Sixth International Conference on Ubiquitous Computing, Workshop on Advanced Context Modelling, Reasoning and Management
Strembeck, M., Neumann, G. (2004) An integrated approach to engineer and enforce context constraints in RBAC environments. ACM Transactions on Information and System Security, 7(3): 392-427
Thomas, R. (1997) Team based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. u: RBAC ’97 Proceedings of the second ACM workshop on Role-based access control, pp. 13-19
Wolf, R., Keinz, T., Schneider, M. (2003) A model for context-dependent access control for web-based services with role-based approach. u: IEEE international workshop on database and expert systems applications (XIV), DEXA, proceedings, 209-214
Yau, S.S., Yao, Y., Banga, V. (2005) Situation-aware access control for service-oriented autonomous decentralized systems. u: Autonomous Decentralized Systems, Proceedings, pp. 17-24
 

O članku

jezik rada: srpski
vrsta rada: članak
objavljen u SCIndeksu: 22.03.2013.

Povezani članci

Info M (2005)
Kontrola pristupa XML dokumentima
Sladić Goran, i dr.

Info M (2013)
Modelovanje kontrole pristupa
Trninić Branislav, i dr.