首页> 外文学位 >Access control models for pervasive computing environments .
【24h】

Access control models for pervasive computing environments .

机译:普适计算环境的访问控制模型。

获取原文
获取原文并翻译 | 示例

摘要

With the growing advancement of pervasive computing technologies, we are moving towards an era where context information will be necessary for access control. Traditional access control models like Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role-Based Access Control (RBAC) do not work well in this scenario for several reasons. First, unlike traditional applications, pervasive computing applications usually do not have well-defined security perimeter--the entities an application will interact with or the resources that will be accessed may not be known in advance. Second, these applications are also dynamic in nature--the accessing entities may change, resources requiring protection may be created or modified, and an entity's access to resources may change during the course of the application, which make the resources protection during application execution extremely challenging. Third, pervasive computing applications use the knowledge of surrounding physical spaces to provide services; security policies designed for such applications must therefore use contextual information. Thus, new access control models and technologies are needed for pervasive computing applications.;In this dissertation, we propose two types of access control models for pervasive computing environments; one determine the accessibility based on the spatio-temporal constraints, and the other determine the accesibility based on the trustworthiness of the entities. The different features of access control models may interact in subtle ways resulting in conflicts. Consequently, it is important to analyze and understand these models before they are widely deployed. The other contribution of this dissertation is to verify the correctness of the model. The results obtained by analyzing the access control models will enable the users of the model to make informed decisions. Toward this end, we propose automated verification techniques for our access control models.
机译:随着普适计算技术的不断发展,我们正在迈向一个时代的时代,在这个时代,上下文信息对于访问控制必不可少。由于多种原因,传统的访问控制模型(如强制性访问控制(MAC),自由访问控制(DAC)和基于角色的访问控制(RBAC))在这种情况下不能很好地工作。首先,与传统应用程序不同,普适计算应用程序通常没有明确定义的安全范围-应用程序将与之交互的实体或将被访问的资源可能事先未知。其次,这些应用程序本质上也是动态的-访问实体可能会更改,需要保护的资源可能会被创建或修改,并且实体在应用程序过程中对资源的访问可能会更改,这使得应用程序执行期间的资源保护变得极为重要。具有挑战性的。第三,普适计算应用程序利用周围物理空间的知识来提供服务。因此,为此类应用程序设计的安全策略必须使用上下文信息。因此,普适计算应用需要新的访问控制模型和技术。本文提出了两种类型的普适计算环境访问控制模型。一个基于时空约束确定可访问性,另一个基于实体的可信度确定可访问性。访问控制模型的不同功能可能以微妙的方式相互作用,从而导致冲突。因此,在广泛部署这些模型之前,分析和理解它们很重要。本文的另一贡献是验证了模型的正确性。通过分析访问控制模型获得的结果将使模型的用户能够做出明智的决策。为此,我们为访问控制模型提出了自动验证技术。

著录项

  • 作者

    Toahchoodee, Manachai.;

  • 作者单位

    Colorado State University.;

  • 授予单位 Colorado State University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2010
  • 页码 264 p.
  • 总页数 264
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号