Anywhere and anytime access to information within computing infrastructures is a purpose of ubiquitous computing. The new security challenges are posed while the information can be accessed at anywhere and anytime since it may be applied by malicious users. A key issue in ubiquitous systems is not who can use sharing resources, but how to control the usage of sharing resources. Usage CONtrol (UCON) is a consolidated solution for this problem. However, the authorization mechanisms of ubiquitous systems do not offer elaborate authorization responses. We extend and improve the UCONA-based authorization policy specification based on a delegation certification offering an elaborate authorization response. Then we show the flexibility and expressive capability of our policy specification through an application example. © 2011 Springer-Verlag.
CITATION STYLE
Gui, J., Chen, Z., & Deng, X. (2011). An improved UCONA-based authorization policy specification for ubiquitous systems. In Communications in Computer and Information Science (Vol. 158 CCIS, pp. 151–158). https://doi.org/10.1007/978-3-642-22694-6_21
Mendeley helps you to discover research relevant for your work.