A review on extended role based access control (E-RBAC) model in pervasive computing environment

Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. T...

Full description

Saved in:
Bibliographic Details
Main Authors: Bakar A.A., Ismail R., Jais J., Manan J.-L.A.
Other Authors: 35178991300
Format: Conference paper
Published: 2023
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Tenaga Nasional
id my.uniten.dspace-30829
record_format dspace
spelling my.uniten.dspace-308292023-12-29T15:54:09Z A review on extended role based access control (E-RBAC) model in pervasive computing environment Bakar A.A. Ismail R. Jais J. Manan J.-L.A. 35178991300 15839357700 57212154525 35203684100 Computer science Mobile devices Neural networks Security systems Ubiquitous computing Wireless networks Access control models Business rule management Context information Context-based Extended role based access control Healthcare domains Pervasive applications Pervasive computing environment RBAC model Role-based access control model Trust-based access control Access control Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as Context Based Access Control (CBAC), Trust Based Access Control (TBAC) and recently many researchers have focused on enhance the Role Based Access Control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas. �2009 IEEE. Final 2023-12-29T07:54:09Z 2023-12-29T07:54:09Z 2009 Conference paper 10.1109/NDT.2009.5272190 2-s2.0-70450158743 https://www.scopus.com/inward/record.uri?eid=2-s2.0-70450158743&doi=10.1109%2fNDT.2009.5272190&partnerID=40&md5=931e186d46681fffabf5f0c5315d3d61 https://irepository.uniten.edu.my/handle/123456789/30829 5272190 533 535 Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
topic Computer science
Mobile devices
Neural networks
Security systems
Ubiquitous computing
Wireless networks
Access control models
Business rule management
Context information
Context-based
Extended role based access control
Healthcare domains
Pervasive applications
Pervasive computing environment
RBAC model
Role-based access control model
Trust-based access control
Access control
spellingShingle Computer science
Mobile devices
Neural networks
Security systems
Ubiquitous computing
Wireless networks
Access control models
Business rule management
Context information
Context-based
Extended role based access control
Healthcare domains
Pervasive applications
Pervasive computing environment
RBAC model
Role-based access control model
Trust-based access control
Access control
Bakar A.A.
Ismail R.
Jais J.
Manan J.-L.A.
A review on extended role based access control (E-RBAC) model in pervasive computing environment
description Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as Context Based Access Control (CBAC), Trust Based Access Control (TBAC) and recently many researchers have focused on enhance the Role Based Access Control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas. �2009 IEEE.
author2 35178991300
author_facet 35178991300
Bakar A.A.
Ismail R.
Jais J.
Manan J.-L.A.
format Conference paper
author Bakar A.A.
Ismail R.
Jais J.
Manan J.-L.A.
author_sort Bakar A.A.
title A review on extended role based access control (E-RBAC) model in pervasive computing environment
title_short A review on extended role based access control (E-RBAC) model in pervasive computing environment
title_full A review on extended role based access control (E-RBAC) model in pervasive computing environment
title_fullStr A review on extended role based access control (E-RBAC) model in pervasive computing environment
title_full_unstemmed A review on extended role based access control (E-RBAC) model in pervasive computing environment
title_sort review on extended role based access control (e-rbac) model in pervasive computing environment
publishDate 2023
_version_ 1806426010002915328