User-centric adaptive access control and resource configuration for ubiquitous computing environments

Mike White, Brendan Jennings, Sven Van Der Meer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Provision of adaptive access control is key to allowing users harness the full potential of ubiquitous computing environments. In this paper, we introduce the M-Zones Access Control (MAC) process, which provides user-centric attribute-based access control, together with automatic reconfiguration of resources in response to the changes in the set of users physically present in the environment. User control is realised via user-specified policies, which are analysed in tandem with system policies and policies of other users, whenever events occur that require policy decisions and associated configuration operations. In such a system users' policies may habitually conflict with system policies, or indeed other users' policies; thus, policy conflict detection and resolution is a critical issue. To address this we describe a conflict detection/resolution method based on a policy precedence scheme. To illustrate the operation of the MAC process and its conflict detection/resolution method, we discuss its realisation in a test bed emulating an office-based ubiquitous computing environment.

Original languageEnglish
Title of host publicationICEIS 2005 - Proceedings of the 7th International Conference on Enterprise Information Systems
Pages349-354
Number of pages6
Publication statusPublished - 2005
Event7th International Conference on Enterprise Information Systems, ICEIS 2005 - Miami, FL, United States
Duration: 25 May 200528 May 2005

Publication series

NameICEIS 2005 - Proceedings of the 7th International Conference on Enterprise Information Systems

Conference

Conference7th International Conference on Enterprise Information Systems, ICEIS 2005
Country/TerritoryUnited States
CityMiami, FL
Period25/05/200528/05/2005

Keywords

  • Access control
  • Conflict detection and resolution
  • Policy based management
  • Ubiquitous computing

Fingerprint

Dive into the research topics of 'User-centric adaptive access control and resource configuration for ubiquitous computing environments'. Together they form a unique fingerprint.

Cite this