Browse > Article

Improved Access Control using Context-Aware Security Service  

Yang, Seok-Hwan (부경대학교 정보보호학)
Chung, Mok-Dong (부경대학교 컴퓨터공학과)
Publication Information
Abstract
As the ubiquitous technology has penetrated into almost every aspect of modern life, the research of the security technology to solve the weakness of security in the ubiquitous environment is received much attention. Because, however, today's security systems are usually based on the fixed rules, many security systems can not handle diverse situations in the ubiquitous environment appropriately. Although many existing researches on context aware security service are based on ACL (Access Control List) or RBAC (Role Based Access Control), they have an overhead in the management of security policy and can not manipulate unexpected situations. Therefore, in this paper, we propose a context-aware security service providing multiple authentications and authorization from a security level which is decided dynamically in a context-aware environment using FCM (Fuzzy C-Means) clustering algorithm and Fuzzy Decision Tree. We show proposed model can solve typical conflict problems of RBAC system due to the fixed rules and improve overhead problem in the security policy management. We expect to apply the proposed model to the various applications using contextual information of the user such as healthcare system, rescue systems, and so on.
Keywords
Context-aware Security; RBAC; FCM(Fuzzy C-Means); Fuzzy Decision Tree;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, and Mustaque Ahamad, "A Context Aware Security Architecture for Emerging Applications," In Proc. of the 18th Annual Computer Security Applications Conferences (ACSAC'02), pp. 249-258, 2002.
2 Michael J. Covington, Matthew J. Moyer, and Mustaque Ahamad, "Generali zed Role-Based Access Control for Securing Future Applications," In Proc of the 23th National Information Systems Security Conference(NISSC), Baltimore, pp. 115-125, 2000.
3 M. J. Moyer and M. Ahamad, "Generalized Role-Based Access Control." In Proc of IEEE International Conference on Distributed Computing Systems (ICDSC2001), pp. 391-398, 2001.
4 R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E.Youman, "Role-based access control models," IEEE Computer. Vol.29. No.2. pp.38-47, 1996.   DOI   ScienceOn
5 오성권, 프로그래밍에 의한 컴퓨터지능, 내하출판사, 2002.
6 이우향, 이건명, "특정공간을 사선 분할하는 퍼지 결정트리 유도," 정보과학회논문지 : 소프트웨어 및 응용, 제29권 제3호, pp. 156-166, 2002.   과학기술학회마을
7 이건명,"퍼지 데이타에 대한 퍼지 결정트리 기반 분류규칙 마이닝," 정보과학회 논문지 : 소프트웨어 및 응용, 제28권, 제1호, pp. 64-72, 2001.
8 이현숙, "점증적 학습 퍼지 신경망을 이용한 적응 분류 모델," 퍼지 및 지능시스템학회 논문지, 제16권, 제6호, pp. 736-741. 2006.   과학기술학회마을
9 보건복지부, "국민건강영양조사 제3기 (2005) 검진조사," 보건복지부 질병관리본부, pp. 114-115, June 2006.
10 J. Bezdek, "A convergence theorem for the fuzzy ISODATA clustering algorithm." IEEE Trans. Pattern Anal. Machine Intelligence, VoI.PAMI-2, No.1 , pp. 1-8, 1980.   DOI
11 Y. Yuan and M.J. Shaw, "Induction of fuzzy decision tree," Fuzzy Sets and Systems, Vol.69, No.2, pp. 125-139, 1995.   DOI   ScienceOn
12 전문진, 도준형, 이상완, 박광현, 변증남, "다변량 퍼지 의사 결정트리와 사용자 적응을 이용한 손동작 인식," 로봇공학회 논문지, 제3권, 제2호, pp. 81-90, 2008.
13 Jalal AI-Muhtadi, Anand Ranganathan. Boy Campbell, and M. Dennis Mickunas, "Cerberus: A Context-Aware Security Scheme for Smart Spaces," In Proc. of the First International Conference on Pervasive Computing and Communications (PerCom'03), 2002.