{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T16:40:14Z","timestamp":1654101614548},"reference-count":33,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7,1]]},"abstract":"<p>Context-awareness is a quintessential feature of ubiquitous computing. Contextual information not only facilitates improved applications, but can also become significant security parameters \u2013 which in turn can potentially ensure service delivery not to anyone anytime anywhere, but to the right person at the right time and place. Specially, in determining access control to resources, contextual information can play an important role. Access control models, as studied in traditional computing security, however, have no notion of context-awareness; and the recent works in the nascent field of context-aware access control predominantly focus on spatio-temporal contexts, disregarding a host of other pertinent contexts. In this paper, with a view to exploring the relationship of access control and context-awareness in ubiquitous computing, the authors propose a comprehensive context-aware access control model for ubiquitous healthcare services. They explain the design, implementation and evaluation of the proposed model in detail. They chose healthcare as a representative application domain because healthcare systems pose an array of non-trivial context-sensitive access control requirements, many of which are directly or indirectly applicable to other context-aware ubiquitous computing applications.<\/p>","DOI":"10.4018\/ijaras.2014070104","type":"journal-article","created":{"date-parts":[[2014,11,6]],"date-time":"2014-11-06T16:32:13Z","timestamp":1415291533000},"page":"61-81","source":"Crossref","is-referenced-by-count":0,"title":["The Context-Security Nexus in Ubiquitous Computing"],"prefix":"10.4018","volume":"5","author":[{"given":"M. Fahim Ferdous","family":"Khan","sequence":"first","affiliation":[{"name":"Graduate School of Interdisciplinary Information Studies, The University of Tokyo, Tokyo, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ken","family":"Sakamura","sequence":"additional","affiliation":[{"name":"Graduate School of Interdisciplinary Information Studies, The University of Tokyo, Tokyo, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"2432","reference":[{"key":"ijaras.2014070104-0","first-page":"101","article-title":"A role-based delegation model and some extensions.","author":"E.Barka","year":"2000","journal-title":"Proceedings of National Information Systems Security Conference"},{"key":"ijaras.2014070104-1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.31"},{"key":"ijaras.2014070104-2","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063985"},{"key":"ijaras.2014070104-3","unstructured":"Canada Health Infoway. (2013). Retrieved April 20, 2013, from https:\/\/www.infoway-inforoute.ca\/lang-en\/"},{"key":"ijaras.2014070104-4","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373258"},{"key":"ijaras.2014070104-5","doi-asserted-by":"publisher","DOI":"10.1007\/s007790170019"},{"key":"ijaras.2014070104-6","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.12"},{"key":"ijaras.2014070104-7","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373259"},{"key":"ijaras.2014070104-8","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2006.19"},{"key":"ijaras.2014070104-9","unstructured":"HL7. (2013). Health Level Seven International, Retrieved April 20, 2013, from http:\/\/www.hl7.org\/"},{"key":"ijaras.2014070104-10","unstructured":"HIPAA. (2013). Health Insurance Portability and Accountability Act. Retrieved April 20, 2013, from http:\/\/www.hhs.gov\/ocr\/privacy\/index.html"},{"key":"ijaras.2014070104-11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.1"},{"key":"ijaras.2014070104-12","unstructured":"Karp, A. H., Haury, H., & Davis, M. S. (2009). From ABAC to ZBAC: The evolution of access control models. Technical Report HPL-2009-30, HP Labs."},{"key":"ijaras.2014070104-13","doi-asserted-by":"crossref","unstructured":"Khan, M. F. F., Yashiro, T., Ito, S., Bessho, M., & Sakamura, K. (2009). A secure and flexible electronic-ticket system. In Proceedings of 33rd Annual IEEE International Computer Software and Applications Conference, (pp. 421-426). Washington, DC, USA: IEEE Computer Society CPS.","DOI":"10.1109\/COMPSAC.2009.63"},{"key":"ijaras.2014070104-14","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2010.87"},{"key":"ijaras.2014070104-15","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.40"},{"key":"ijaras.2014070104-16","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"ijaras.2014070104-17","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998453"},{"key":"ijaras.2014070104-18","unstructured":"Prot\u00e9g\u00e9 Ontology Editor and Knowledge Acquisition System. (2013). Retrieved April 20, 2013, from http:\/\/protege.stanford.edu\/"},{"key":"ijaras.2014070104-19","unstructured":"Rjaibi, W. (2004). An introduction to multilevel secure relational database management systems. In Proceedings of 24th Conference of the Center for Advanced Studies on Collaborative Research (pp. 232\u2013241). Markham, Ontario, Canada: IBM Press."},{"key":"ijaras.2014070104-20","doi-asserted-by":"publisher","DOI":"10.1109\/40.977753"},{"key":"ijaras.2014070104-21","first-page":"343","article-title":"Access control for active spaces.","author":"G.Sampemane","year":"2002","journal-title":"Proceedings of Annual Computer Security Applications Conference"},{"key":"ijaras.2014070104-22","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"ijaras.2014070104-23","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ijaras.2014070104-24","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(99)00120-X"},{"key":"ijaras.2014070104-25","first-page":"572","article-title":"Context-roles based access control for context aware applications","author":"P.Seon-Ho","year":"2006","journal-title":"High Performance Computing and Communications"},{"key":"ijaras.2014070104-26","doi-asserted-by":"publisher","DOI":"10.1145\/266741.266748"},{"key":"ijaras.2014070104-27","unstructured":"Wang, Q., & Jin, H. (2008). Usable authentication for electronic healthcare systems. Poster presented at the Symposium on Usable Privacy and Security, Pittsburg, PA, USA."},{"key":"ijaras.2014070104-28","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507730"},{"key":"ijaras.2014070104-29","first-page":"497","article-title":"A context, rule and RBAC access control in enterprise pervasive computing environment","author":"H.Xianxi","year":"2006","journal-title":"Proceedings of 1st International Symposium on Pervasive Computing and Applications"},{"key":"ijaras.2014070104-30","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2011.5720616"},{"key":"ijaras.2014070104-31","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373289"},{"key":"ijaras.2014070104-32","doi-asserted-by":"publisher","DOI":"10.1145\/775427.775431"}],"container-title":["International Journal of Adaptive, Resilient and Autonomic Systems"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=118298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T16:25:47Z","timestamp":1654100747000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijaras.2014070104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,7,1]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijaras.2014070104","relation":{},"ISSN":["1947-9220","1947-9239"],"issn-type":[{"value":"1947-9220","type":"print"},{"value":"1947-9239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,1]]}}}