Browse > Article

A Method for Access Control on Uncertain Context  

Kang, Woo-Jun (그리스도대학교 경영학부 경영정보학전공)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.10, no.6, 2010 , pp. 215-223 More about this Journal
Abstract
New information technologies make it easy to access and acquire information in various ways. However, It also enable powerful and various threat to system security. The prominent database technology challenging these threats is access control. Currently, to keep pace with the new paradigms, new extended access control methods are challenged. We study access control with uncertain context. With respect to access control, it is possible that there is a discrepancy between the syntactic phrase in security policies and that in queries, called semantic gap problem. In our semantic access control, we extract semantic implications from context tree and introduce the measure factor to calculate the degree of the discrepancy, which is used to control the exceed privileges.
Keywords
접근제어;상황인지;온톨로지;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Kumar, N., Chafle, G., "Context Sensitivity in Role-based Access Control", Operating Systems Review, Vol. 36, No. 3, IBM Journal, 2002
2 Wang, X.H., Xhang, D.Q., Gu, T., and Pung, H.K., "Ontology Based Context Modeling and Reasoning using OWL", in PerCom2004 Annual Conference on Pervasive computing and Communications Workshop, 2004
3 Rastogi et al, "Access Control over Uncertain Data", PVLDB '08, 2008.
4 P. Balbiani, "Acces control with uncertain surveillance", International Conference on Web Intelligence, 2005.
5 Dalvi et al, "Efficient query evaluation on probabilistic databases", VLDB J, 2007.
6 Sandhu, R., Ferraiolo, D., and Kuhm, R., "The NIST Model for Role-Based Access Control: Towards A Unified Standard", in Proceedings of the fifth ACM workshop on Role-based access control, 2000
7 Ranganathan, R, Campbell R.H., "An Infrastructure for context-awareness based on first-order logic", Personal and Ubiquitous Computing, Vol. 7, Issue 6, 2003
8 Qin, L., Atluri, V., "Concept-level Access Control for the Semantic Web", in ACM Workshop on XML Security, 2003.
9 Byun, J., Bertino, E., Li, N., "Purpose-based Access Control of Complex Data for Privacy Protection", SACMAT, pp102-110, 2005
10 Weiser, M., "Hot Topics: Ubiquitous Computing", IEEE Computer, 1993.   DOI   ScienceOn