DOI QR코드

DOI QR Code

Context-based Authentication Service for The Mobile Office

  • Yang, Jiyoung (Dept. of Computer Engineering, Pukyong National University) ;
  • Lee, Hyundong (Dept. of Computer Engineering, Pukyong National University) ;
  • Rhyoo, Shi-Kook (Division of Info. Tech., Kyungnam College of Information & Technology) ;
  • Chung, Mokdong (Dept. of Computer Engineering, Pukyong National University)
  • Received : 2012.09.24
  • Accepted : 2012.11.27
  • Published : 2012.12.31

Abstract

Today many companies introduce new mobile office environments evolved from the recent rapid development in mobile device technologies. Most of the recent mobile office systems use a simple authentication scheme such as ID/Password. This method is easy to use, but it does not consider the user's context. Thus it cannot provide appropriate security service required by the user's proper contexts. Therefore, this paper proposes a context based authentication system which applies security level verification and uses fuzzy algorithm based on the importance of access authority control.

Keywords

References

  1. S.Y. Na. Y.H. Lee, S.j. Ji., "Smartphones and Mobile Office Security Issues and Strategies," National Information Society Agency, Vol. 26, No. 1, pp. 12-20, 2010.
  2. Gaeil An, Guntae Bae, Kiyoung Kim, and Dongil Seo, "Context-aware Dynamic Security Configuration for Mobile Communication Device," Proc. of the Mobility and Security (NTMS 2009) , pp.79-83 , 2009.
  3. Schilit. B., Adams. N., and Want. R., "Context- Aware Computing Applications," Proc. of the 1st International Workshop on Mobile Computing Systems and Applications, pp. 85-90, 1994.
  4. A.K. Dey, "Understanding and using Context," Personal and Ubiquitous Computing J., Vol. 5, No. 1, pp. 4-7, 2001. https://doi.org/10.1007/s007790170019
  5. Harry Chen, Tim Finin, Anupam Joshi, An Intelligent Broker Architecture for Pervasive Context-aware Systems, Doctorial Thesis of UMBC, 2004.
  6. Gaia project, http://gaia.cs.uiuc.edu, 2000.
  7. Tao Gu , Xiao Hang Wang , Hung Keng Pung ,Da Qing Zhang, "An Ontology-based Context Model in Intelligent Environments," Proc. Communication Networks and Distributed Systems Modeling and Simulation Conference, 2004.
  8. Hyun Kim, Young-Jo Cho, Sang-Rok Oh, "CAMUS - A Middleware Supporting Context-aware Services for Network- based Robots," Proc. of IEEE Workshop on Advanced Robotics and I ts Social Impacts, Nagoya, pp. 237-242 , 2005.
  9. Jaegeol Yim, Gyeyoung Lee, Kyubark Shim, Thanh Cong Le., "A Method of Determining Whether a Smart-Phone is Moving," Journal of Korea Multimedia Society, Vol. 15, No. 5, pp. 632-638, 2012. https://doi.org/10.9717/kmms.2012.15.5.632
  10. Choi Sung-Min, Lim Jong-Kwon, Oh Sang- Keun, and SeoChee-Ho, "A Research for Weight Decision of Waterproofing Methods Selection Evaluation Item using the AHP," Proceeding of The Korea Institute of Building Construction Conference, Vol. 8, No. 2, pp. 205- 211, 2008.
  11. Satty, T.L, The Analytic Hierachy Process, McGraw Hill, America, 1980.
  12. L.A. Zadeh, "The Concept of Lingustic Variable and Its Application to Approximate Reasoning," Infomation Sciences, Vol. 9, No, 1, pp. 43-80, 1975. https://doi.org/10.1016/0020-0255(75)90017-1
  13. Hyung-Kwang Lee and Gil-Rok Oh, Fuzzy Theory and Application, 1st Ed, Hongreung Media, Republic of Korea, 1991
  14. CVE: http://www.cve.mitre.org, 2012.
  15. Yong-Hyuk Kim, Artificial Intelligence, 2nd Ed, Hanbit Media, Republic of Korea, 2011.
  16. Da Young Chang, "Applications of the Extent Analysis Method on Fuzzy AHP," European Journal of Operational Research, Vol. 95, No. 3, pp. 649-655, 1996. https://doi.org/10.1016/0377-2217(95)00300-2