Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2008.15-C.6.493

Context-based Dynamic Access Control Model for u-healthcare and its Application  

Jeong, Chang-Won (원광대학교 전기전자 및 정보공학부)
Kim, Dong-Ho ((주)PC 닥터 부설 연구소)
Joo, Su-Chong (원광대학교 전기전자 및 정보공학부)
Abstract
In this paper we suggest dynamic access control model based on context satisfied with requirement of u-healthcare environment through researching the role based access control model. For the dynamic security domain management, we used a distributed object group framework and context information for dynamic access control used the constructed database. We defined decision rule by knowledge reduction in decision making table, and applied this rule in our model as a rough set theory. We showed the executed results of context based dynamic security service through u-healthcare application which is based on distributed object group framework. As a result, our dynamic access control model provides an appropriate security service according to security domain, more flexible access control in u-healthcare environment.
Keywords
Security; Role Based Access Control; Dynamic Access Control; Context Aware; Distributed Object Group Framework; Ubiquitous;
Citations & Related Records
연도 인용수 순위
  • Reference
1 정창원, 김동호, 김명희, 주수종, “u-헬스케어 지원 분산 프레임워크에서 접근 제어 모델을 이용한 동적 보안 서비스”, 한국인터넷정보학회 논문지, 제8권 6호, pp.29-42, 2007.12   과학기술학회마을
2 Gustaf Neumann and Mark Strembeck, “An Approach to Engineer and Enforce Context Constraints in an RBAC Environment,” In 8th ACM Symposium on Access Control Models and Technologies (SACMAT2003), pp.65-79, Como, Italy, June, 2003   DOI
3 Martin Strassner and Thomas Schoch, “Today's Impact of Ubiquitous Computing on Business Process,” Pervasive 2003 short paper proceedings, pp.62-74, Zurich, May, 2002
4 D. F. Ferraiolo, J. A. Cugini, D. Richard Kunj, “Role-Based Access Control(RABC) : Features and Motivations,” Proceedings of the 11th Annual Computer Security Applications Conferences, pp.241-248, 1995
5 R. S. Sandhu and E. J. Coyne, “Role-Based Access Control Models,” IEEE Computer, 20(2), pp.38-47, 1996
6 R. S. Sandhu, D. Ferrraiolo and R. Kuhn, “The NIST Model for Role-Based Access Control: Towards A Unified Model Approach,” ACM Workshop on Role-Based Access Control, pp.47-63, 2000
7 CMU : Aura Project : Pervasive invisible computing, http://www-2.cs.cmu.edu/~aura/
8 M.J.Moyer and M. Ahamad, “Generalized Role-Based Access Control,” IEEE International Conference on Distributed Computing Systems(ICDCS2001), pp.391-398, 2001   DOI
9 MIT Oxygen Project, http://oxygen.lcs.mit.edu/
10 UC Berkeley Smart Dust Project, http://www-bsac.eecs.berkeley.edu/archive/users/warneke-brett/SmartDust/index.html
11 이충섭, 정창원, 주수종, “헬스케어 홈 서비스를 위한 데이터베이스 및 응용 서비스 구현”, 한국인터넷정보학회 논문지 제 8권 1호, pp.57-70, FEB., 2007   과학기술학회마을
12 Pawlak, Z., “Rough Set Approach to Knowledge-Based Decision Support,” ICSWUT Reports on Rough Set, March, 1995
13 Le Hoai Bac and Nguyen Anh Tuan, “Using Rough Set in Feature Selection and Reduction in Face Recognition Problem,” PAKDD 2005, LNAI 3518, pp.226-233, 2005   DOI   ScienceOn
14 Chang-Sun Shin, Myoung-Suk Kang, Chang-Won Jeong and Su-Chong Joo, “TMO-Based Object Group Framework for Supporting Distributed Object Management and Real-Time Services,” Lecture Notes in Computer Science, Vol.2834, pp.525-535, 2003. 9   DOI
15 Chang-Sun Shin, Chung-Sub Lee and Su-Chong Joo, “Healthcare Home service System Based on Distributed Object Group Framework,” Lecture Notes in Computer Science, Vol.3983, pp.798–807, 8-11, May, 2006   DOI   ScienceOn
16 김동호, 정창원, 주수종, “분산 객체그룹 프레임워크의 보안서비스를 지원하는 보안 정책 관리”, 한국인터넷정보학회학술지, 제8권 2호, pp.149-152, 2007.10.02-03
17 J. F. Barkley, K. Beznosov and J. Uppal, “Supporting Relationships in Access Control Using Role Based Access Control,” pp.55-65, RBAC '99. Proceedings of the 4th ACM workshop on Role based access control, 1999   DOI