Publication:
A review on extended role based access control (E-RBAC) model in pervasive computing environment

dc.citedby11
dc.contributor.authorBakar A.A.en_US
dc.contributor.authorIsmail R.en_US
dc.contributor.authorJais J.en_US
dc.contributor.authorManan J.-L.A.en_US
dc.contributor.authorid35178991300en_US
dc.contributor.authorid15839357700en_US
dc.contributor.authorid57212154525en_US
dc.contributor.authorid35203684100en_US
dc.date.accessioned2023-12-29T07:54:09Z
dc.date.available2023-12-29T07:54:09Z
dc.date.issued2009
dc.description.abstractPervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as Context Based Access Control (CBAC), Trust Based Access Control (TBAC) and recently many researchers have focused on enhance the Role Based Access Control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas. �2009 IEEE.en_US
dc.description.natureFinalen_US
dc.identifier.ArtNo5272190
dc.identifier.doi10.1109/NDT.2009.5272190
dc.identifier.epage535
dc.identifier.scopus2-s2.0-70450158743
dc.identifier.spage533
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-70450158743&doi=10.1109%2fNDT.2009.5272190&partnerID=40&md5=931e186d46681fffabf5f0c5315d3d61
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/30829
dc.pagecount2
dc.sourceScopus
dc.sourcetitle2009 1st International Conference on Networked Digital Technologies, NDT 2009
dc.subjectComputer science
dc.subjectMobile devices
dc.subjectNeural networks
dc.subjectSecurity systems
dc.subjectUbiquitous computing
dc.subjectWireless networks
dc.subjectAccess control models
dc.subjectBusiness rule management
dc.subjectContext information
dc.subjectContext-based
dc.subjectExtended role based access control
dc.subjectHealthcare domains
dc.subjectPervasive applications
dc.subjectPervasive computing environment
dc.subjectRBAC model
dc.subjectRole-based access control model
dc.subjectTrust-based access control
dc.subjectAccess control
dc.titleA review on extended role based access control (E-RBAC) model in pervasive computing environmenten_US
dc.typeConference paperen_US
dspace.entity.typePublication
Files
Collections