Access control models for pervasive computing environments
dc.contributor.author | Toahchoodee, Manachai, author | |
dc.contributor.author | Ray, Indrakshi, advisor | |
dc.contributor.author | McConnell, Ross M., committee member | |
dc.contributor.author | Ray, Indrajit, 1966-, committee member | |
dc.contributor.author | Hayne, Stephen, committee member | |
dc.date.accessioned | 2007-01-03T05:45:12Z | |
dc.date.available | 2007-01-03T05:45:12Z | |
dc.date.issued | 2010 | |
dc.description | Department Head: L. Darrell Whitley. | |
dc.description.abstract | With the growing advancement of pervasive computing technologies, we are moving towards an era where context information will be necessary for access control. Traditional access control models like Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role-Based Access Control (RBAC) do not work well in this scenario for several reasons. First, unlike traditional applications, pervasive computing applications usually do not have well-defined security perimeter-the entities an application will interact with or the resources that will be accessed may not be known in advance. Second, these applications are also dynamic in nature--the accessing entities may change, resources requiring protection may be created or modified, and an entity's access to resources may change during the course of the application, which make the resources protection during application execution extremely challenging. Third, pervasive computing applications use the knowledge of surrounding physical spaces to provide services; security policies designed for such applications must therefore use contextual information. Thus, new access control models and technologies are needed for pervasive computing applications. In this dissertation, we propose two types of access control models for pervasive computing environments; one determine the accessibility based on the spatio-temporal constraints, and the other determine the accessibility based on the trustworthiness of the entities. The different features of access control models may interact in subtle ways resulting in conflicts. Consequently, it is important to analyze and understand these models before they are widely deployed. The other contribution of this dissertation is to verify the correctness of the model. The results obtained by analyzing the access control models will enable the users of the model to make informed decisions. Toward this end, we propose automated verification techniques for our access control models. | |
dc.format.medium | born digital | |
dc.format.medium | doctoral dissertations | |
dc.identifier | 2010_Summer_Toahchoodee_Manachai.pdf | |
dc.identifier | Toahchoodee_colostate_0053A_10044.pdf | |
dc.identifier | ETDF2010100005COMS | |
dc.identifier.uri | http://hdl.handle.net/10217/39107 | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | Colorado State University. Libraries | |
dc.relation.ispartof | 2000-2019 | |
dc.rights | Copyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright. | |
dc.subject | data security | |
dc.subject | RBAC | |
dc.subject | pervasive computing | |
dc.subject | computer security | |
dc.subject | access control model for pervasive computing | |
dc.subject | access control model | |
dc.subject | Ubiquitous computing | |
dc.subject | Context-aware computing | |
dc.subject | Computers -- Access control | |
dc.subject | Computer security | |
dc.title | Access control models for pervasive computing environments | |
dc.type | Text | |
dcterms.rights.dpla | This Item is protected by copyright and/or related rights (https://rightsstatements.org/vocab/InC/1.0/). You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). | |
thesis.degree.discipline | Computer Science | |
thesis.degree.grantor | Colorado State University | |
thesis.degree.level | Doctoral | |
thesis.degree.name | Doctor of Philosophy (Ph.D.) |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 2010_Summer_Toahchoodee_Manachai.pdf
- Size:
- 1.28 MB
- Format:
- Adobe Portable Document Format
- Description: