计算机应用 ›› 2012, Vol. 32 ›› Issue (02): 489-492.DOI: 10.3724/SP.J.1087.2012.00489

• 信息安全 • 上一篇    下一篇

基于上下文的普适计算使用控制模型

武海鹰   

  1. 武警工程学院 通信工程系,西安 710086
  • 收稿日期:2011-08-15 修回日期:2011-09-22 发布日期:2012-02-23 出版日期:2012-02-01
  • 通讯作者: 武海鹰
  • 作者简介:武海鹰(1975-),女,陕西宝鸡人,讲师,硕士,主要研究方向:信息安全、访问控制。
  • 基金资助:
    武警工程学院基础理论研究项目(WJY201021)

Context-based usage control model for pervasive computing

WU Hai-ying   

  1. Department of Communication Engineering, Engineering College of Police Force, Xi'an Shaanxi 710086, China
  • Received:2011-08-15 Revised:2011-09-22 Online:2012-02-23 Published:2012-02-01
  • Contact: WU Hai-ying

摘要: 目前普适计算中的访问控制绝大多数采用基于角色访问控制模型(RBAC);然而使用控制(UCON)模型具有可变性和持续性,更适合普适计算,但没有充分考虑上下文信息。在UCON模型中增加对上下文信息考虑的同时将义务和条件决策因素分为静态和动态,提出了基于上下文的普适计算使用控制(Con_UCON)模型,动态义务和条件作为使用过程中的决策因素;同时建立了模型的核心规则集,并给出了形式语言描述。该模型能满足普适计算环境中访问控制的需求。通过普适计算智能办公系统中的三个实例,证明此模型具有有效性、灵活性和安全性。

关键词: 使用控制, 上下文, 普适计算, 访问控制, 角色访问控制

Abstract: At present, access control mostly adopts Role Based Access Control (RBAC) model in pervasive computing; however, Usage Control (UCON) model possesses mutability and continuity, and mostly fits pervasive computing, but no sufficiently considers context information. Based on UCON model, a context-based pervasive computing usage control (Con_UCON) model was proposed. Con_UCON model considered the context information, and divided the decisive factors of obligation and condition into the static and the dynamic. Dynamic obligation and condition were used as decisive factors in usage. The core rules of the model were established, and the description of the model was given by descriptive language. The model provides the means to meet the need of access control in pervasive computing. The results on three examples of pervasive computing intelligent office systems demonstrate the model's efficiency, flexibility and security.

Key words: usage control, context, pervasive computing, access control, Role Based Access Control (RBAC)

中图分类号: