Enforcement of CA-UCON Model
dc.contributor.author | Almutairi, Abdulgader | en |
dc.contributor.author | Siewe, Francois | en |
dc.date.accessioned | 2015-09-01T15:35:00Z | |
dc.date.available | 2015-09-01T15:35:00Z | |
dc.date.issued | 2015-06-10 | |
dc.description.abstract | A Context-Aware Usage CONtrol (CA- UCON) model is an extension of the traditional UCON model which enable adaptation to environmental changes in the aim of preserving continuity of access. When the authorisations and obligations requirements are met by the subject and the object, and the conditions requirements fail due to changes in the environment or the system con- text, CA-UCON model triggers specific actions to adapt to the new situation. Besides the data protection, CA-UCON model so enhances the quality of services, striving to keep explicit interactions with the user at a minimum. In this paper, we propose an architecture of the reference monitor for the CA-UCON model and investigate a variety of enforcement approaches in ubiquitous computing systems; whether centralised, distributed or hybrid; depending on applications. | en |
dc.funder | true | en |
dc.identifier.citation | Almutairi, A., and Siewe, F. (2015). Enforcement of CA-UCON Model. International Conference on Network security & Computer Science (ICNSCS-15), Antalya, Turkey, pp. 1--6 | en |
dc.identifier.uri | http://hdl.handle.net/2086/11177 | |
dc.language.iso | en | en |
dc.peerreviewed | Yes | en |
dc.projectid | true | en |
dc.publisher | International Academy of Engineers (IA-E) | en |
dc.researchgroup | Software Technology Research Laboratory (STRL) | en |
dc.researchinstitute | Cyber Technology Institute (CTI) | en |
dc.subject | Pervasive system | en |
dc.subject | context-aware | en |
dc.subject | usage control | en |
dc.subject | enforcement | en |
dc.title | Enforcement of CA-UCON Model | en |
dc.type | Conference | en |