Criticality aware access control model for pervasive applications

Sandeep Gupta, T. Mukherjee, K. Venkatasubramanian

Research output: Chapter in Book/Report/Conference proceedingConference contribution

43 Scopus citations

Abstract

Access control policies define the rules for accessing system resources. Traditionally, these are designed to take a reactive view for providing access, based on explicit user request. This methodology may not be sufficient in the case of critical events (emergencies) where automatic and timely access to resources may be required to facilitate corrective actions. This paper introduces the novel concept of criticality which measures the level of responsiveness for taking such actions. The paper further incorporates criticality in an access control framework for facilitating the management of critical situations. Specific properties and requirements for such criticality aware access control are identified and a sample model is provided along with its verification.

Original languageEnglish (US)
Title of host publicationProceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006
PublisherIEEE Computer Society
Pages253-257
Number of pages5
ISBN (Print)0769525180, 9780769525181
DOIs
StatePublished - 2006
Event4th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006 - Pisa, Italy
Duration: Mar 13 2006Mar 17 2006

Publication series

NameProceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006
Volume2006

Other

Other4th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006
CountryItaly
CityPisa
Period3/13/063/17/06

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Criticality aware access control model for pervasive applications'. Together they form a unique fingerprint.

  • Cite this

    Gupta, S., Mukherjee, T., & Venkatasubramanian, K. (2006). Criticality aware access control model for pervasive applications. In Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006 (pp. 253-257). [1604815] (Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006; Vol. 2006). IEEE Computer Society. https://doi.org/10.1109/PERCOM.2006.19