Role-based Access Control Model in Home Network Environments
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Role-based Access Control Model in Home Network Environments

Authors: Do-Woo Kim, Geon Woo Kim, Jun-Ho Lee, Jong-Wook Han

Abstract:

The home in these days has not one computer connected to the Internet but rather a network of many devices within the home, and that network might be connected to the Internet. In such an environment, the potential for attacks is greatly increased. The general security technology can not apply because of the use of various wired and wireless network, middleware and protocol in digital home environment and a restricted system resource of home information appliances. To offer secure home services home network environments have need of access control for various home devices and information when users want to access. Therefore home network access control for user authorization is a very important issue. In this paper we propose access control model using RBAC in home network environments to provide home users with secure home services.

Keywords: Home network, access control, RBAC, security.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1078879

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1914

References:


[1] Carl M. Ellison, Home Network Security, Intel Technology Journal, 2002.
[2] Guoyou He, Requirements for Security in Home Environments, Residential and Virtual Home Environments Seminar on Internetworking, Spring 2002.
[3] David F. Ferraiolo, R.S. Sandhu, Serban Gavrila, D.Richard Kuhn and Ramaswamy Chandramouli, Proposed NIST Standard for Role-Based Access Contro", ACM Transactions on Information and Systems Security (TISSEC), Volume 4, Number 3, August 2001.
[4] R.S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman, Role based access control model", IEEE Computer, 29 February 1996.
[5] David F. Ferraiolo, D Richard Kuhn, Role-Based Access Control, Artech House Inc, 2003
[6] Matthew J. Brodeur, Security Concerns In Home Automation Technologies, 2001.
[7] David Ferraiolo and Richard Kuhn. Role-based access control, In 15th NIST-NCSC National Computer Security Conference, pages 554-563, Baltimore, MD, October 13-16 1992.
[8] Kim Thomas, Building a Secure Home Network, SANS Institute, 2001
[9] Stallings William, Network Security Essentials: Applications and Standards, Prentice Hall, 2000.
[10] Gerard O'Driscoll, Essential Guide to Home Networking Technologies, Prentice Hall, 2000.
[11] http://www.iec.org/online/tutorials/home_net/