TY - GEN
T1 - User-centric adaptive access control and resource configuration for ubiquitous computing environments
AU - White, Mike
AU - Jennings, Brendan
AU - Van Der Meer, Sven
PY - 2005
Y1 - 2005
N2 - Provision of adaptive access control is key to allowing users harness the full potential of ubiquitous computing environments. In this paper, we introduce the M-Zones Access Control (MAC) process, which provides user-centric attribute-based access control, together with automatic reconfiguration of resources in response to the changes in the set of users physically present in the environment. User control is realised via user-specified policies, which are analysed in tandem with system policies and policies of other users, whenever events occur that require policy decisions and associated configuration operations. In such a system users' policies may habitually conflict with system policies, or indeed other users' policies; thus, policy conflict detection and resolution is a critical issue. To address this we describe a conflict detection/resolution method based on a policy precedence scheme. To illustrate the operation of the MAC process and its conflict detection/resolution method, we discuss its realisation in a test bed emulating an office-based ubiquitous computing environment.
AB - Provision of adaptive access control is key to allowing users harness the full potential of ubiquitous computing environments. In this paper, we introduce the M-Zones Access Control (MAC) process, which provides user-centric attribute-based access control, together with automatic reconfiguration of resources in response to the changes in the set of users physically present in the environment. User control is realised via user-specified policies, which are analysed in tandem with system policies and policies of other users, whenever events occur that require policy decisions and associated configuration operations. In such a system users' policies may habitually conflict with system policies, or indeed other users' policies; thus, policy conflict detection and resolution is a critical issue. To address this we describe a conflict detection/resolution method based on a policy precedence scheme. To illustrate the operation of the MAC process and its conflict detection/resolution method, we discuss its realisation in a test bed emulating an office-based ubiquitous computing environment.
KW - Access control
KW - Conflict detection and resolution
KW - Policy based management
KW - Ubiquitous computing
UR - http://www.scopus.com/inward/record.url?scp=78649306365&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:78649306365
SN - 9728865198
SN - 9789728865191
T3 - ICEIS 2005 - Proceedings of the 7th International Conference on Enterprise Information Systems
SP - 349
EP - 354
BT - ICEIS 2005 - Proceedings of the 7th International Conference on Enterprise Information Systems
T2 - 7th International Conference on Enterprise Information Systems, ICEIS 2005
Y2 - 25 May 2005 through 28 May 2005
ER -