2006
DOI: 10.1007/11847366_59
|View full text |Cite
|
Sign up to set email alerts
|

Context-Role Based Access Control for Context-Aware Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
1

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 46 publications
(26 citation statements)
references
References 4 publications
0
25
0
1
Order By: Relevance
“…Regarding the RBAC successors, the following models among them are briefly described below: GRBAC (Covington et al, 2000;Moyer and Ahamad, 2001), TRBAC (Bertino et al, 2001), GTRBAC (Joshi et al, 2005), Geo-RBAC , CA-RBAC (Kulkarni and Tripathi, 2008) and CRBAC (Park et al, 2006). GRBAC (Joshi, et al, 2005;Moyer and Ahamad, 2001) is a generalization of the original RBAC by incorporating the concepts of object roles and environment roles in order to apply RBAC for thehome-of-the-future application.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Regarding the RBAC successors, the following models among them are briefly described below: GRBAC (Covington et al, 2000;Moyer and Ahamad, 2001), TRBAC (Bertino et al, 2001), GTRBAC (Joshi et al, 2005), Geo-RBAC , CA-RBAC (Kulkarni and Tripathi, 2008) and CRBAC (Park et al, 2006). GRBAC (Joshi, et al, 2005;Moyer and Ahamad, 2001) is a generalization of the original RBAC by incorporating the concepts of object roles and environment roles in order to apply RBAC for thehome-of-the-future application.…”
Section: Discussionmentioning
confidence: 99%
“…On the layer, appropriate permission privileges can be performed by dynamic object bindings. On the other hands, C-RBAC, context-role based access control model, supports a new concept of context role (Park et al, 2006). A context role is used to capture security relevant context information about the environment for use in C-RBAC policies.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, this problem violates user/role and role/permission associations. So, S. Park et al [24] have proposed an improved model entitled Context-Role Based Access Control (CRBAC) model retaining the notion of permission in RBAC and adds a new notion of Context-role which is similar to Environment roles in GRBAC and represents environment state of the system by a mapping context-roles and context information. By using the uniform notion of a role to capture both user and context attributes, they will build an access control model that grants and applies permissions to users according to current context information.…”
Section: Fig 2 System Flow Diagram Of Role Based Access Control Modementioning
confidence: 99%
“…We make use of context in our system for sharing context as well as for restricting the sharing of context using context constraints while RBAC model [15] does not make use of context for these purposes. Some other systems which made use of context in RBAC include [4] and [14]. Hybrid policy used in our system may result in policy conflicts which are handled by defining priorities for different entities and different types of rules.…”
Section: Background and Related Workmentioning
confidence: 99%