Repository logo
 

Access control models for pervasive computing environments

dc.contributor.authorToahchoodee, Manachai, author
dc.contributor.authorRay, Indrakshi, advisor
dc.contributor.authorMcConnell, Ross M., committee member
dc.contributor.authorRay, Indrajit, 1966-, committee member
dc.contributor.authorHayne, Stephen, committee member
dc.date.accessioned2007-01-03T05:45:12Z
dc.date.available2007-01-03T05:45:12Z
dc.date.issued2010
dc.descriptionDepartment Head: L. Darrell Whitley.
dc.description.abstractWith the growing advancement of pervasive computing technologies, we are moving towards an era where context information will be necessary for access control. Traditional access control models like Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role-Based Access Control (RBAC) do not work well in this scenario for several reasons. First, unlike traditional applications, pervasive computing applications usually do not have well-defined security perimeter-the entities an application will interact with or the resources that will be accessed may not be known in advance. Second, these applications are also dynamic in nature--the accessing entities may change, resources requiring protection may be created or modified, and an entity's access to resources may change during the course of the application, which make the resources protection during application execution extremely challenging. Third, pervasive computing applications use the knowledge of surrounding physical spaces to provide services; security policies designed for such applications must therefore use contextual information. Thus, new access control models and technologies are needed for pervasive computing applications. In this dissertation, we propose two types of access control models for pervasive computing environments; one determine the accessibility based on the spatio-temporal constraints, and the other determine the accessibility based on the trustworthiness of the entities. The different features of access control models may interact in subtle ways resulting in conflicts. Consequently, it is important to analyze and understand these models before they are widely deployed. The other contribution of this dissertation is to verify the correctness of the model. The results obtained by analyzing the access control models will enable the users of the model to make informed decisions. Toward this end, we propose automated verification techniques for our access control models.
dc.format.mediumborn digital
dc.format.mediumdoctoral dissertations
dc.identifier2010_Summer_Toahchoodee_Manachai.pdf
dc.identifierToahchoodee_colostate_0053A_10044.pdf
dc.identifierETDF2010100005COMS
dc.identifier.urihttp://hdl.handle.net/10217/39107
dc.languageEnglish
dc.language.isoeng
dc.publisherColorado State University. Libraries
dc.relation.ispartof2000-2019
dc.rightsCopyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright.
dc.subjectdata security
dc.subjectRBAC
dc.subjectpervasive computing
dc.subjectcomputer security
dc.subjectaccess control model for pervasive computing
dc.subjectaccess control model
dc.subject.lcshUbiquitous computing
dc.subject.lcshContext-aware computing
dc.subject.lcshComputers -- Access control
dc.subject.lcshComputer security
dc.titleAccess control models for pervasive computing environments
dc.typeText
dcterms.rights.dplaThis Item is protected by copyright and/or related rights (https://rightsstatements.org/vocab/InC/1.0/). You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
thesis.degree.disciplineComputer Science
thesis.degree.grantorColorado State University
thesis.degree.levelDoctoral
thesis.degree.nameDoctor of Philosophy (Ph.D.)

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2010_Summer_Toahchoodee_Manachai.pdf
Size:
1.28 MB
Format:
Adobe Portable Document Format
Description: