Skip to main content

Towards a Context Aware Modeling of Trust and Access Control Based on the User Behavior and Capabilities

  • Conference paper
Inclusive Society: Health and Wellbeing in the Community, and Care at Home (ICOST 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7910))

Included in the following conference series:

Abstract

During the last decade, several context based security models has been proposed to take into account the user behavior aspect. However the studied context is mainly related to device and spatio-temporal features, which may led to a weak and inappropriate contextual modeling. By using the huge and various contextual data issued from the sensors deployed in smart environments, our objective is to provide a security framework suitable for dependant people. This paper shows our approach to model both trust and access control based on the deduced user behavior and capabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Furnell, S.M., Dowland, P.S., Illingworth, H.M., Reynolds, P.L.: Authentication and Supervision: A survey of User Attitudes. J. Computers & Security 19(6), 529–539 (2000)

    Article  Google Scholar 

  2. Helkala, K.: Disabilities and Authentication Methods: Usability and Security. In: 7th International Conference on Availability, Reliability and Security, pp. 327–334 (2012)

    Google Scholar 

  3. Rodwell, P.M., Furnell, S.M., Reynolds, P.L.: A Non-Intrusive Biometric Authentication Mechanism Utilizing Physiological Characteristics of the Human Head. J. Computers & Security 26, 468–478 (2007)

    Article  Google Scholar 

  4. Al-Khazzar, A., Savage, N.: A2BeST: Graphical Authentication Based on User Behaviour. In: International Conference on (2010)

    Google Scholar 

  5. Rocha, C.C., Lima, J.C.D., Dantas, M.A.R., Augustin, I.: A2BeST: An Adaptive Authentication Service Based on Mobile User’s Behavior and Spatio-Temporal Context. In: The International Conference on, pp. 771–774. Springer, Heidelberg (2011)

    Google Scholar 

  6. Lima, J.C.D., Rocha, C.C., Augustin, I., Dantas, M.A.R.: A Context Aware Recommendation System to Behavioral Based Authentication in Mobile and Pervasive Environments. In: 9th International Conference on Embedded and Ubiquitous Computing, pp. 312–319 (2011)

    Google Scholar 

  7. Brosso, I., La Neve, A.: A Continuous Authentication System Based On User Behavior Analysis. In: The International Conference on Availability, Reliability and Security, pp. 380–385 (2010)

    Google Scholar 

  8. Ahamed, S.I., Haque, M.M., Hoque, E., Rahman, F., Talukder, N.: Design, Analysis and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments. J. of Systems and Software 83(2), 253–270 (2010)

    Article  Google Scholar 

  9. Boukerche, A., Yonglin, R.: A secure mo bile healthcare system using trust-based multicast scheme. J. of IEEE on Selected Areas in Communications 27(4), 387–399 (2009)

    Article  Google Scholar 

  10. Zia, T., Islam, M.Z.: Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks. In: International Conference on Availability, Reliability and Security, pp. 347–352 (2010)

    Google Scholar 

  11. El Husseini, A., M’hamed, A., El-Hassan, B., Mokhtari, M.: Trust-based Authentication Scheme with User Rating for Low-ressource Devices in Smart Environments. J. Personal and Ubiquitous Computing 10(1), 21–27 (2012)

    Google Scholar 

  12. Asmidar, A., Roslan, I., Jamilin, J.: A Review on Extended Role Based Access Control (E-RBAC) Model in Pervasive Computing Environment. In: IEEE International Conference on Intelligent Pervasive Computing, pp. 533–535 (2009)

    Google Scholar 

  13. Sadat, E.S., Amini, M., Zokaei, S.: A Context-Aware Access Control Model for Pervasive Computing Environments. In: IEEE International Conference on Intelligent Pervasive Computing, pp. 51–56 (2007)

    Google Scholar 

  14. Yao, H., Hu, H., Huang, B., Li, R.: Dynamic Role and Context Based Access Control for Grid Applications. In: The 6th International Conference on Parallel and Distributed Computing, Applications and Technology, pp. 404–406 (2005)

    Google Scholar 

  15. Filho, J.B., Martin, H.: A generalized context-based access control model for pervasive environments. In: The 2nd International Workshop on Security and Privacy in GIS and LBS, pp. 12–21 (2009)

    Google Scholar 

  16. Zerkouk, M., M’hamed, A., Messabih, B.: A User Profile Based Access Control Model and Architecture. I. J. Computer Networks & Communications 5(1), 171–181 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mhamed, A., Zerkouk, M., El Husseini, A., Messabih, B., El Hassan, B. (2013). Towards a Context Aware Modeling of Trust and Access Control Based on the User Behavior and Capabilities. In: Biswas, J., Kobayashi, H., Wong, L., Abdulrazak, B., Mokhtari, M. (eds) Inclusive Society: Health and Wellbeing in the Community, and Care at Home. ICOST 2013. Lecture Notes in Computer Science, vol 7910. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39470-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39470-6_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39469-0

  • Online ISBN: 978-3-642-39470-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics