Publication: A review on extended role based access control (E-RBAC) model in pervasive computing environment
dc.citedby | 11 | |
dc.contributor.author | Bakar A.A. | en_US |
dc.contributor.author | Ismail R. | en_US |
dc.contributor.author | Jais J. | en_US |
dc.contributor.author | Manan J.-L.A. | en_US |
dc.contributor.authorid | 35178991300 | en_US |
dc.contributor.authorid | 15839357700 | en_US |
dc.contributor.authorid | 57212154525 | en_US |
dc.contributor.authorid | 35203684100 | en_US |
dc.date.accessioned | 2023-12-29T07:54:09Z | |
dc.date.available | 2023-12-29T07:54:09Z | |
dc.date.issued | 2009 | |
dc.description.abstract | Pervasive computing environments (PCE) derive the emergence of new pervasive application ranging from home to healthcare domain. These applications can be accessed from any place; at any time from anyone as in PCE users are mobile and may use mobile devices in accessing the resources and services. Thus controlling access to resource/services is a concern security question in PCE. Researchers have constructed many methods in order to restrict access in this environment such as Context Based Access Control (CBAC), Trust Based Access Control (TBAC) and recently many researchers have focused on enhance the Role Based Access Control (RBAC) model with other parameter/areas such as context information, business rule management, credential, neural network, trust and risk in order to come out with a new access control model that able to fit in PCE. This paper is to review the existing models that have extended RBAC model with those above mentioned areas. �2009 IEEE. | en_US |
dc.description.nature | Final | en_US |
dc.identifier.ArtNo | 5272190 | |
dc.identifier.doi | 10.1109/NDT.2009.5272190 | |
dc.identifier.epage | 535 | |
dc.identifier.scopus | 2-s2.0-70450158743 | |
dc.identifier.spage | 533 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-70450158743&doi=10.1109%2fNDT.2009.5272190&partnerID=40&md5=931e186d46681fffabf5f0c5315d3d61 | |
dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/30829 | |
dc.pagecount | 2 | |
dc.source | Scopus | |
dc.sourcetitle | 2009 1st International Conference on Networked Digital Technologies, NDT 2009 | |
dc.subject | Computer science | |
dc.subject | Mobile devices | |
dc.subject | Neural networks | |
dc.subject | Security systems | |
dc.subject | Ubiquitous computing | |
dc.subject | Wireless networks | |
dc.subject | Access control models | |
dc.subject | Business rule management | |
dc.subject | Context information | |
dc.subject | Context-based | |
dc.subject | Extended role based access control | |
dc.subject | Healthcare domains | |
dc.subject | Pervasive applications | |
dc.subject | Pervasive computing environment | |
dc.subject | RBAC model | |
dc.subject | Role-based access control model | |
dc.subject | Trust-based access control | |
dc.subject | Access control | |
dc.title | A review on extended role based access control (E-RBAC) model in pervasive computing environment | en_US |
dc.type | Conference paper | en_US |
dspace.entity.type | Publication |