Browse > Article
http://dx.doi.org/10.7236/IJASC.2018.7.4.66

An extended Access Control with Uncertain Context  

Kang, Woojun (Dept. of Business Administration, KC University)
Publication Information
International journal of advanced smart convergence / v.7, no.4, 2018 , pp. 66-74 More about this Journal
Abstract
While new information technology advances have made information access and acquisition methods much more diverse and easier, there are side effects that allow illegal access using diverse and high-performance tools. In order to cope with such threats, there are access control methods in database technology, and various studies are being conducted to extend traditional access control to cope with new computing environments. In this paper, we propose an extended access control with uncertain context-awareness. It enables appropriate security policy enforcement even if the contextual constraints specified by the security policy does not match those accompanied by access request query. We extract semantic implications from context tree, and define the argument that can quantitatively measure the semantic difference between two nodes in the context tree. It is used to semantically enforce the security policy, and to prevent the excessive authorization caused by the implication.
Keywords
Database Security; Access Control; Context-aware; Tree Hierarchy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Sandhu, P. Samarati., "Access control: principles and practice", IEEE Communication Magazine, vol. 32, 1994.
2 Qin, L., Atluri, V., "Concept-level Access Control for the Semantic Web", in ACM Workshop on XML Security, 2003.
3 Byun, J., Bertino, E., Li, N., "Purpose-based Access Control of Complex Data for Privacy Protection", SACMAT, pp102-110, 2005.
4 Weiser, M., "Hot Topics: Ubiquitous Computing", IEEE Computer, 1993.
5 Kumar, N., Chafle, G., "Context Sensitivity in Role-based Access Control", Operating Systems Review, Vol. 36, No. 3, IBM Journal, 2002.
6 Wang, X.H., Xhang, D.Q., Gu, T., and Pung, H.K., "Ontology Based Context Modeling and Reasoning using OWL", in PerCom2004 Annual Conference on Pervasive computing and Communications Workshop, 2004.
7 Rastogi et al, "Access Control over Uncertain Data", PVLDB '08, 2008.
8 P. Balbiani, "Acces control with uncertain surveillance", International Conference on Web Intelligence, 2005.
9 Dalvi et al, "Efficient query evaluation on probabilistic databases", VLDB J, 2007.
10 Sandhu, R., Ferraiolo, D., and Kuhm, R., "The NIST Model for Role-Based Access Control: Towards A Unified Standard", in Proceedings of the fifth ACM workshop on Role-based access control, 2000.
11 Ranganathan, R, Campbell R.H., "An Infrastructure for context-awareness based on first-order logic", Personal and Ubiquitous Computing, Vol. 7, Issue 6, 2003.