Title :
Criticality aware access control model for pervasive applications
Author :
Gupta, S.K.S. ; Mukherjee, T. ; Venkatasubramanian, K.
Author_Institution :
Dept. of Comput. Sci. & Eng., Arizona State Univ., Tempe, AZ
Abstract :
Access control policies define the rules for accessing system resources. Traditionally, these are designed to take a reactive view for providing access, based on explicit user request. This methodology may not be sufficient in the case of critical events (emergencies) where automatic and timely access to resources may be required to facilitate corrective actions. This paper introduces the novel concept of criticality which measures the level of responsiveness for taking such actions. The paper further incorporates criticality in an access control framework for facilitating the management of critical situations. Specific properties and requirements for such criticality aware access control are identified and a sample model is provided along with its verification
Keywords :
authorisation; formal verification; ubiquitous computing; criticality aware access control model; pervasive applications; system resources; Access control; Application software; Computer hacking; Computer science; Delay; Disaster management; Monitoring; Pervasive computing; Smart homes; Tornadoes;
Conference_Titel :
Pervasive Computing and Communications, 2006. PerCom 2006. Fourth Annual IEEE International Conference on
Conference_Location :
Pisa
Print_ISBN :
0-7695-2518-0
DOI :
10.1109/PERCOM.2006.19