Font Size: a A A

Research And Implementation Of Access Control In Pervasive Computing Based XACML

Posted on:2009-08-25Degree:MasterType:Thesis
Country:ChinaCandidate:W JiaFull Text:PDF
GTID:2178360242466528Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Based on good understanding of the characteristic and security requirements of pervasive computing, we use the polupar access control technology - XACML for reference and build up one access control architecture in pervasive computing based on XACML. Surrounding this architecture, we emphasize on some key points: firstly, we come up with a new arithmetic based on priority to avoid the bottleneck of computing of a great number of access requests in pervasive computing environment. We use role importancy, time limit and history computing information to envaluate this priority. Secondly, we conclude three application patterns to improve the adaptability of our architecture. And refer to the privacy leaking which is brought by the context-ware ability of our access control architecture, we bring forward a solution based XML security, which can not only keep our messgae format flexible and extensible, but also keep privacy secret.
Keywords/Search Tags:XACML, pervasive computing, priority-based arithmatic, application frame, context-ware, privacy leak
PDF Full Text Request
Related items