Criticality aware access control model for pervasive applications

Sandeep Gupta, T. Mukherjee, K. Venkatasubramanian

Research output: Chapter in Book/Report/Conference proceedingConference contribution

44 Citations (Scopus)

Abstract

Access control policies define the rules for accessing system resources. Traditionally, these are designed to take a reactive view for providing access, based on explicit user request. This methodology may not be sufficient in the case of critical events (emergencies) where automatic and timely access to resources may be required to facilitate corrective actions. This paper introduces the novel concept of criticality which measures the level of responsiveness for taking such actions. The paper further incorporates criticality in an access control framework for facilitating the management of critical situations. Specific properties and requirements for such criticality aware access control are identified and a sample model is provided along with its verification.

Original languageEnglish (US)
Title of host publicationProceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006
Pages251-255
Number of pages5
Volume2006
DOIs
StatePublished - 2006
Event4th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006 - Pisa, Italy
Duration: Mar 13 2006Mar 17 2006

Other

Other4th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006
CountryItaly
CityPisa
Period3/13/063/17/06

Fingerprint

Access control

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Gupta, S., Mukherjee, T., & Venkatasubramanian, K. (2006). Criticality aware access control model for pervasive applications. In Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006 (Vol. 2006, pp. 251-255). [1604815] https://doi.org/10.1109/PERCOM.2006.19

Criticality aware access control model for pervasive applications. / Gupta, Sandeep; Mukherjee, T.; Venkatasubramanian, K.

Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006. Vol. 2006 2006. p. 251-255 1604815.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gupta, S, Mukherjee, T & Venkatasubramanian, K 2006, Criticality aware access control model for pervasive applications. in Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006. vol. 2006, 1604815, pp. 251-255, 4th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006, Pisa, Italy, 3/13/06. https://doi.org/10.1109/PERCOM.2006.19
Gupta S, Mukherjee T, Venkatasubramanian K. Criticality aware access control model for pervasive applications. In Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006. Vol. 2006. 2006. p. 251-255. 1604815 https://doi.org/10.1109/PERCOM.2006.19
Gupta, Sandeep ; Mukherjee, T. ; Venkatasubramanian, K. / Criticality aware access control model for pervasive applications. Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006. Vol. 2006 2006. pp. 251-255
@inproceedings{afe6e169bcf64162b383a08f16a0969c,
title = "Criticality aware access control model for pervasive applications",
abstract = "Access control policies define the rules for accessing system resources. Traditionally, these are designed to take a reactive view for providing access, based on explicit user request. This methodology may not be sufficient in the case of critical events (emergencies) where automatic and timely access to resources may be required to facilitate corrective actions. This paper introduces the novel concept of criticality which measures the level of responsiveness for taking such actions. The paper further incorporates criticality in an access control framework for facilitating the management of critical situations. Specific properties and requirements for such criticality aware access control are identified and a sample model is provided along with its verification.",
author = "Sandeep Gupta and T. Mukherjee and K. Venkatasubramanian",
year = "2006",
doi = "10.1109/PERCOM.2006.19",
language = "English (US)",
isbn = "0769525180",
volume = "2006",
pages = "251--255",
booktitle = "Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006",

}

TY - GEN

T1 - Criticality aware access control model for pervasive applications

AU - Gupta, Sandeep

AU - Mukherjee, T.

AU - Venkatasubramanian, K.

PY - 2006

Y1 - 2006

N2 - Access control policies define the rules for accessing system resources. Traditionally, these are designed to take a reactive view for providing access, based on explicit user request. This methodology may not be sufficient in the case of critical events (emergencies) where automatic and timely access to resources may be required to facilitate corrective actions. This paper introduces the novel concept of criticality which measures the level of responsiveness for taking such actions. The paper further incorporates criticality in an access control framework for facilitating the management of critical situations. Specific properties and requirements for such criticality aware access control are identified and a sample model is provided along with its verification.

AB - Access control policies define the rules for accessing system resources. Traditionally, these are designed to take a reactive view for providing access, based on explicit user request. This methodology may not be sufficient in the case of critical events (emergencies) where automatic and timely access to resources may be required to facilitate corrective actions. This paper introduces the novel concept of criticality which measures the level of responsiveness for taking such actions. The paper further incorporates criticality in an access control framework for facilitating the management of critical situations. Specific properties and requirements for such criticality aware access control are identified and a sample model is provided along with its verification.

UR - http://www.scopus.com/inward/record.url?scp=33750321755&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33750321755&partnerID=8YFLogxK

U2 - 10.1109/PERCOM.2006.19

DO - 10.1109/PERCOM.2006.19

M3 - Conference contribution

AN - SCOPUS:33750321755

SN - 0769525180

SN - 9780769525181

VL - 2006

SP - 251

EP - 255

BT - Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006

ER -