Abstract
During the last decade, several context based security models has been proposed to take into account the user behavior aspect. However the studied context is mainly related to device and spatio-temporal features, which may led to a weak and inappropriate contextual modeling. By using the huge and various contextual data issued from the sensors deployed in smart environments, our objective is to provide a security framework suitable for dependant people. This paper shows our approach to model both trust and access control based on the deduced user behavior and capabilities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Furnell, S.M., Dowland, P.S., Illingworth, H.M., Reynolds, P.L.: Authentication and Supervision: A survey of User Attitudes. J. Computers & Security 19(6), 529–539 (2000)
Helkala, K.: Disabilities and Authentication Methods: Usability and Security. In: 7th International Conference on Availability, Reliability and Security, pp. 327–334 (2012)
Rodwell, P.M., Furnell, S.M., Reynolds, P.L.: A Non-Intrusive Biometric Authentication Mechanism Utilizing Physiological Characteristics of the Human Head. J. Computers & Security 26, 468–478 (2007)
Al-Khazzar, A., Savage, N.: A2BeST: Graphical Authentication Based on User Behaviour. In: International Conference on (2010)
Rocha, C.C., Lima, J.C.D., Dantas, M.A.R., Augustin, I.: A2BeST: An Adaptive Authentication Service Based on Mobile User’s Behavior and Spatio-Temporal Context. In: The International Conference on, pp. 771–774. Springer, Heidelberg (2011)
Lima, J.C.D., Rocha, C.C., Augustin, I., Dantas, M.A.R.: A Context Aware Recommendation System to Behavioral Based Authentication in Mobile and Pervasive Environments. In: 9th International Conference on Embedded and Ubiquitous Computing, pp. 312–319 (2011)
Brosso, I., La Neve, A.: A Continuous Authentication System Based On User Behavior Analysis. In: The International Conference on Availability, Reliability and Security, pp. 380–385 (2010)
Ahamed, S.I., Haque, M.M., Hoque, E., Rahman, F., Talukder, N.: Design, Analysis and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments. J. of Systems and Software 83(2), 253–270 (2010)
Boukerche, A., Yonglin, R.: A secure mo bile healthcare system using trust-based multicast scheme. J. of IEEE on Selected Areas in Communications 27(4), 387–399 (2009)
Zia, T., Islam, M.Z.: Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks. In: International Conference on Availability, Reliability and Security, pp. 347–352 (2010)
El Husseini, A., M’hamed, A., El-Hassan, B., Mokhtari, M.: Trust-based Authentication Scheme with User Rating for Low-ressource Devices in Smart Environments. J. Personal and Ubiquitous Computing 10(1), 21–27 (2012)
Asmidar, A., Roslan, I., Jamilin, J.: A Review on Extended Role Based Access Control (E-RBAC) Model in Pervasive Computing Environment. In: IEEE International Conference on Intelligent Pervasive Computing, pp. 533–535 (2009)
Sadat, E.S., Amini, M., Zokaei, S.: A Context-Aware Access Control Model for Pervasive Computing Environments. In: IEEE International Conference on Intelligent Pervasive Computing, pp. 51–56 (2007)
Yao, H., Hu, H., Huang, B., Li, R.: Dynamic Role and Context Based Access Control for Grid Applications. In: The 6th International Conference on Parallel and Distributed Computing, Applications and Technology, pp. 404–406 (2005)
Filho, J.B., Martin, H.: A generalized context-based access control model for pervasive environments. In: The 2nd International Workshop on Security and Privacy in GIS and LBS, pp. 12–21 (2009)
Zerkouk, M., M’hamed, A., Messabih, B.: A User Profile Based Access Control Model and Architecture. I. J. Computer Networks & Communications 5(1), 171–181 (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mhamed, A., Zerkouk, M., El Husseini, A., Messabih, B., El Hassan, B. (2013). Towards a Context Aware Modeling of Trust and Access Control Based on the User Behavior and Capabilities. In: Biswas, J., Kobayashi, H., Wong, L., Abdulrazak, B., Mokhtari, M. (eds) Inclusive Society: Health and Wellbeing in the Community, and Care at Home. ICOST 2013. Lecture Notes in Computer Science, vol 7910. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39470-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-39470-6_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39469-0
Online ISBN: 978-3-642-39470-6
eBook Packages: Computer ScienceComputer Science (R0)