Requirements Analysis for Access Control Model on Ubiquitous Computing Environment 


Vol. 11,  No. 7, pp. 563-570, Dec.  2004
10.3745/KIPSTA.2004.11.7.563


PDF
  Abstract

Ubiquitous computing environment requires strong security and privacy. Access control is one of security areas. Access control on Ubiquitous computing is different from it on traditional information systems so that traditional access control models are not suitable for Ubiquitous computing environment. This research defines Ubiquitous computing environment as an access control point of view, and shows requirements to consider for developing access control model for Ubiquitous computing environment. It also brings up three implementing types of access control on Ubiquitous computing environment.

  Statistics


  Cite this article

[IEEE Style]

S. J. Oh and J. H. Park, "Requirements Analysis for Access Control Model on Ubiquitous Computing Environment," The KIPS Transactions:PartA, vol. 11, no. 7, pp. 563-570, 2004. DOI: 10.3745/KIPSTA.2004.11.7.563.

[ACM Style]

Se Jong Oh and Je Ho Park. 2004. Requirements Analysis for Access Control Model on Ubiquitous Computing Environment. The KIPS Transactions:PartA, 11, 7, (2004), 563-570. DOI: 10.3745/KIPSTA.2004.11.7.563.