A review on extended role based access control (E-RBAC) model in pervasive computing environment
Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. T...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Conference paper |
Published: |
2023
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-30829 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-308292023-12-29T15:54:09Z A review on extended role based access control (E-RBAC) model in pervasive computing environment Bakar A.A. Ismail R. Jais J. Manan J.-L.A. 35178991300 15839357700 57212154525 35203684100 Computer science Mobile devices Neural networks Security systems Ubiquitous computing Wireless networks Access control models Business rule management Context information Context-based Extended role based access control Healthcare domains Pervasive applications Pervasive computing environment RBAC model Role-based access control model Trust-based access control Access control Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as Context Based Access Control (CBAC), Trust Based Access Control (TBAC) and recently many researchers have focused on enhance the Role Based Access Control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas. �2009 IEEE. Final 2023-12-29T07:54:09Z 2023-12-29T07:54:09Z 2009 Conference paper 10.1109/NDT.2009.5272190 2-s2.0-70450158743 https://www.scopus.com/inward/record.uri?eid=2-s2.0-70450158743&doi=10.1109%2fNDT.2009.5272190&partnerID=40&md5=931e186d46681fffabf5f0c5315d3d61 https://irepository.uniten.edu.my/handle/123456789/30829 5272190 533 535 Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
topic |
Computer science Mobile devices Neural networks Security systems Ubiquitous computing Wireless networks Access control models Business rule management Context information Context-based Extended role based access control Healthcare domains Pervasive applications Pervasive computing environment RBAC model Role-based access control model Trust-based access control Access control |
spellingShingle |
Computer science Mobile devices Neural networks Security systems Ubiquitous computing Wireless networks Access control models Business rule management Context information Context-based Extended role based access control Healthcare domains Pervasive applications Pervasive computing environment RBAC model Role-based access control model Trust-based access control Access control Bakar A.A. Ismail R. Jais J. Manan J.-L.A. A review on extended role based access control (E-RBAC) model in pervasive computing environment |
description |
Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as Context Based Access Control (CBAC), Trust Based Access Control (TBAC) and recently many researchers have focused on enhance the Role Based Access Control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas. �2009 IEEE. |
author2 |
35178991300 |
author_facet |
35178991300 Bakar A.A. Ismail R. Jais J. Manan J.-L.A. |
format |
Conference paper |
author |
Bakar A.A. Ismail R. Jais J. Manan J.-L.A. |
author_sort |
Bakar A.A. |
title |
A review on extended role based access control (E-RBAC) model in pervasive computing environment |
title_short |
A review on extended role based access control (E-RBAC) model in pervasive computing environment |
title_full |
A review on extended role based access control (E-RBAC) model in pervasive computing environment |
title_fullStr |
A review on extended role based access control (E-RBAC) model in pervasive computing environment |
title_full_unstemmed |
A review on extended role based access control (E-RBAC) model in pervasive computing environment |
title_sort |
review on extended role based access control (e-rbac) model in pervasive computing environment |
publishDate |
2023 |
_version_ |
1806426010002915328 |
score |
13.214268 |