IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

The Context-Security Nexus in Ubiquitous Computing

The Context-Security Nexus in Ubiquitous Computing
View Sample PDF
Author(s): M. Fahim Ferdous Khan (The University of Tokyo, Japan)and Ken Sakamura (The University of Tokyo, Japan)
Copyright: 2016
Pages: 20
Source title: Leadership and Personnel Management: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-9624-2.ch030

Purchase

View The Context-Security Nexus in Ubiquitous Computing on the publisher's website for pricing and purchasing information.

Abstract

Context-awareness is a quintessential feature of ubiquitous computing. Contextual information not only facilitates improved applications, but can also become significant security parameters – which in turn can potentially ensure service delivery not to anyone anytime anywhere, but to the right person at the right time and place. Specially, in determining access control to resources, contextual information can play an important role. Access control models, as studied in traditional computing security, however, have no notion of context-awareness; and the recent works in the nascent field of context-aware access control predominantly focus on spatio-temporal contexts, disregarding a host of other pertinent contexts. In this paper, with a view to exploring the relationship of access control and context-awareness in ubiquitous computing, the authors propose a comprehensive context-aware access control model for ubiquitous healthcare services. They explain the design, implementation and evaluation of the proposed model in detail. They chose healthcare as a representative application domain because healthcare systems pose an array of non-trivial context-sensitive access control requirements, many of which are directly or indirectly applicable to other context-aware ubiquitous computing applications.

Related Content

Anastasia A. Katou, Mohinder Chand Dhiman, Anastasia Vayona, Maria Gianni. © 2024. 22 pages.
José Ricardo Andrade. © 2024. 20 pages.
Richa Kapoor Mehra. © 2024. 17 pages.
Rajwant Kaur. © 2024. 14 pages.
Namrita Kalia. © 2024. 14 pages.
Hasiba Salihy, Dipanker Sharma. © 2024. 14 pages.
Priya Sharma, Rozy Dhanta, Atul Sharma. © 2024. 20 pages.
Body Bottom