Abstract
Currently, access control is facing many issues for information protection in the ubiquitous sensor network (USN) environment. In particular, dynamic access control is a central problem where context always changes because of volatile ubiquitous sensors. The use of context is important in USN. In this paper, we focus on the context-driven privacy protection model. In context-based access control research, the access permission technique that uses context is being intensely investigated because of the ease with which various dynamic access permissions can be assigned in accordance with the various changes in context. A key feature of this approach is dynamic access control. Therefore, we propose a model for privacy preservation that is context-based dynamic access control that uses intuitive 5W1H for USN. According to this model, the access control strategy can be determined dynamically based on context elements and subject attributes, in addition to objects and operations, using access control entities; therefore, it is relatively easy to infer the dynamic access control of context expressivity both accurately and efficiently.
1. Introduction
Ubiquitous computing is an environment unrestricted by spatiotemporal conditions [1]. It allows computing among humans, objects, and information through the interaction of diverse sensors immersed in the ubiquitous sensor network (USN) environment [2]. The context is information produced in the diverse ubiquitous sensors, and such information provides various services through an intersystem information exchange in various domains and interaction. Such context is volatile information strongly influenced by environmental elements, such as time and space. Therefore, in order to process such information, a dynamic processing technology is required in USN. Furthermore, because the access permission to entities that will perform the service according to the changing context is also volatile, an approach control model to accommodate the dynamic change is required. In other words, despite the fact that the same user gains access to a certain system, depending on the surrounding context (e.g., time, space, and user), the user access authorization can change dynamically.
There are already preexisting studies on various technologies and techniques to process context [3–10]. Many of the studies offered ontological-modeling-based techniques for the processing of semantic context [7–10]. The main issue of the ontology-based context-aware model is the maintenance of interoperability between the modeling level and context information. The modeling level for context recognition is divided into tightly and loosely coupled pervasive system modeling. Tightly coupled pervasive system modeling can provide high-performance services that can be specialized in certain domains, but additional time and cost are incurred for the additional processes necessary for analyzing the context information of different domains. Loosely coupled pervasive system modeling is advantageous in that it is independent of the domain and utilizes a variety of context information. However, it is less appealing because it is not adequate for processing inferences or providing the high-performance service required for processing context application (generating context B through context A) and context combination (context B + context C = context D in context A) processing.
In order to remedy such problems, in a previous research [11] that we conducted, we proposed an intuitive ontology-based
Role-based access control (RBAC) [12–14] is the most representative access control model. Recent studies proposed various extended RBAC (such as relationship-based, purposed-based, and context-based). The basic RBAC concept is as follows: permissions are assigned to functional roles within an enterprise or individual user, and then the necessary permissions are authorized by assigning them to a role or a set of roles [15]. The role-based model grants (or denies) a subject access to data regardless of the request context. In addition, a privacy policy is mainly concerned with which data object is used for which purposes. Thus, purpose is a central concept in many privacy-protecting access control models [16–19].
Unfortunately, privacy protection cannot be readily conducted by traditional RBAC models. The first reason is that whereas traditional RBAC models focus on which user is performing which action on which data object, privacy policies are concerned with which data object is used [20]. Another reason for the difficulty of privacy protection is that the comport level of data usage varies from individual to individual [15]. In addition, in order to process the dynamic context change in role- and purpose-based research, conditions or constraints were defined to support the changing access control. Nevertheless, conditions or constraints are defined only in part by the developer; hence, they have limitations in covering/supporting the various context changes required in a ubiquitous computing environment. In this paper, we focus on the context-driven privacy protection model. In fact, context and access control are essentially interdependent. In context-based access control research, an access permission technique that uses context is being intensely investigated because of the ease with which various dynamic access permissions can be assigned in accordance with the various changes in context [21–29].
In this paper, we propose a
Consequently, we address this goal by presenting a comprehensive approach to dynamic access control management, which is the fundamental problem on which context-aware access control can be developed. In our paper, the purpose term has been superseded by goal. Furthermore, our notion of role attributes is closely related to the notions presented in [30, 31] in that it allows the specification and enforcement of context-based policies in RBAC. However, we build upon and further elaborate the existing notions with the presence of conditional roles with context-aware entities in order to achieve fine-grained administrative access control.
The remainder of this paper is organized as follows. Section 2 describes the background and related work; the model of the CBDAC that formally defines the notation of access permission is illustrated in Section 3; Section 4 describes its use case scenario and implementation. Finally, in Section 5, we suggest the conclusion and future work.
2. Background and Related Work
2.1. CA5W1HOnto
Context refers to a special form of knowledge and, for this reason, it constitutes an important modeling requirement that is the tradeoff between expressiveness and complexity. To resolve the tradeoff issue that concerns context-aware modeling, ontology (i.e., OWL-DL) may be utilized. The ontological concept is an important component in determining the expressiveness of knowledge and reasoning capability for context awareness. Ontology amply expresses concepts and their relationships and automatic reasoning in processing context based on the expressive capacity. The model
Figure 1 shows the key elements that constitute the

Conceptual model of
The
One of the merits of ontologically modeling contextual information lies in its ability to automatically extract new knowledge on current context, in addition to providing ample formalism with streamlined expressiveness about the knowledge.
2.2. RBAC
RBAC was proposed by Sandhu et al. in 1996 [32]. The fundamental idea of RBAC is to authorize data access based on user role. Role means the function of the user or the organization, and such role and user have an N:N relationship. In other words, the user can have various different roles, and one role can be assigned to several users. The relationships among roles are defined through the role hierarchy. RBAC can be applied to various environments or applications through simple role-based access control, where the role attributes are associated with the roles in order to enforce global constraints such as the principle of the separation of duty [33]. That is, there is a limitation to providing privacy protections by defining conditions flexibly based on the attributes of the role (e.g., conditional activation, role deactivation, and role membership qualification). RBAC can be divided into the more detailed attributes of roles, permissions, users, and sessions, and a more diverse definition of constraints is necessary [8, 9]. In addition, because the role hierarchy is a predefined static role, in dynamic environments such as context-aware, wireless computing, and ubiquitous computing environments, where a volatile context is produced, instead of determining the access control permission based on simply on role, dynamic access control is required for the process of such a volatile context.
Purpose-based Access Control (PBAC) [34] defines the access control model using not only an RBAC-based role, but also purpose as a key concept. Purpose describes the reasons for data collection and data access. PBAC defines the relationships among purposes with the purpose hierarchy (purpose tree) and, based on this, the intended and access purposes are specified. Access purpose specifies the purpose for the access when a request for data access is made. When the user makes a request for data access, the access control engine compares the access and intended purposes of the data requested by the user and then verifies whether the user has access authorization. However, the access purpose of the PBAC is declared by the users, which implies low flexibility, and the storage of privacy metadata is based on labeling schemes, which is triggered overhead.
Dynamic Purpose-based Access Control (DPBAC) [35] includes a dynamic concept in the PBAC model. In order to implement strengthened privacy preservation, DPBAC separates the access purpose authorization from the access decision. For the protection of privacy data, the data provider predefines the intended purpose (AIP or PIP). In contrast, the data owner holds the responsibility for the policy that manages the authorization of the access purpose. DPBAC defines the conditional role and supports the preexisting RBAC and other dynamic access controls. Because the conditional role compares the predefined static role based on subject attributes and context attributes of the system, it dynamically determines the access purpose and purpose compliance.
Conditional Purpose-based Access Control Model with Dynamic Role (CPBAC) [20] makes use of the preexisting PBAC and DPBAC to support the conditional role. In CPBAC, the conditional intended purpose is proposed so that data access is permitted only when a certain purpose satisfies some conditions. In order to fulfill such a requirement, the data provider should predefine the intended purpose for the protection of the privacy data and set the scope of the data to be made publicly.
2.3. Context-Based Access Control Models
The concept of the basic RBAC model grants or denies role access to data regardless of the requested context. However, the requested context affects the decision to access objects or systems. In other words, context information provides significant access control parameters. For example, in mobile banking systems, environmental context such as location, time, and others could affect the access decision to grant or deny data access to the account or operating function of the banking system. For this reason, extended access control models based on RBAC were proposed to support context information [21–29].
CRBAC [21] is a contextual role-based access control authorization model for electronic patient records (EPRs). Contextual authorizations use the environmental information available at access time, such as user/patient relationship, in order to determine whether a user is allowed to access an EPR resource. This model extends RBAC by data-access rules for processing the context of large-scale healthcare. The data-access rules are defined by a five-tuple <Role, Privilege-Type, Operation, Object, Authorization-Type>. The five-tuple represents more expressions than the basic RBAC. However, a logical expression of CRBAC is difficult for the modeling that uses data-access rules. Another proposed contextual extension of RBAC is the Attribute-Based Access Control (ABAC) model [22]. The ABAC model authorizes or denies service access based on the attributes communicated by the subject. In order to specify the attribute-based policies, a data structure that uses algebraic operations was proposed. Geo-RBAC is an access control model for processing spatial and location-based information by expanding RBAC [23]. In Geo-RBAC, spatial entities are used for modeling objects, user positions, and geographically bounded roles. A physical position includes the information provided from mobile devices or smartphones and logical, device-independent position information such as roads, villages, buildings, or locations. Geo-RBAC is a flexible model for spatial information processing with high reusability. Generalized Temporal Role-Based Access Control (GTRBAC) [24] proposed the access control model to consider the time context and offered an extended RBAC model capable of expressing a wider range of temporal constraints. In particular, this model is designed possibly not only for period constraints, but also for the regular expressions of roles, user-role assignments, and role-permission assignments. The CAP model [25] is the access control model for resources in pervasive computing environments. This model consists of a two-step access control with the user session registering to the domain authority and the session agent self-governing access through the session permission assignment database. Dynamic Role-Based Access Control model (DRBAC) [26] extends the basic RBAC model to support the dynamic context information. This model dynamically adjusts the static role and permission assignments based on context information but depends on a central authorizer to change the active role of the user's agent according to context change. Carminati et al. [27] proposed an access control model for the purpose of controlling information sharing in a web-based social network. This model uses the rule-based approach to specify access policies. The context of the certified users is defined by the type, depth, and trust level of the relationship among the nodes in the network. The difference between such a model and the conventional access control system is that access control enforcement is conducted on the client side through semidecentralized architecture. RelBac [28] proposed permissions as being relationships between subjects and objects, where subjects and objects are entity sets, and permissions are a relationship set. The novel idea that this model presents is that, for the process of dynamic contexts, it formalizes the binary relationship between subjects and objects as permissions. SitBAC [29] is a model that utilizes those situations that define context elements and attributes for applying context to the access control. Furthermore, in this research, an inference is supported with OWL-DL and SWRL. However, SitBAC is specialized to a domain called healthcare; hence, it has limitations with respect to the processing context of other domains.
3. CBDAC Model
In this section, we propose an overall structure and formalized definition for the CBDAC model, which is the extended form of RBAC, during the application of ontology technologies. It is ultimately aimed at guaranteeing the dynamic access condition of the data access control.
Based on the RBAC model, the CBDAC model extends mainly in the aspects described following Figure 2. Figure 2 shows the proposed CBDAC model that consists of the Profile Manager, Ontological Concepts, Context Manager, Concepts, and Access Permission. In particular, at the research stage of privacy protection in the CBDAC model, the Access Conditions and Intended Goal (that consists of Allowable Intended Goal, Conditional Intended Goal, and Prohibited Intended Goal) into Access Permission are significant.
Profile Manager defines and manages the information on Profile and Roles with regard to Subject in order to generate context. The key concept of the RBAC model is Role, which represents a certain specific job function in an organization. A Role is assigned to the Subject, such as RBAC, by the Profile Manager. In other words, the Role of the Subject represents a working position or working function of the user/system assigned within the Profile Manager. Ontological Concept is defined by the ontological elements (e.g., concept, instance, datatype, data property, and object property). It is utilized for managing context in the Context Manager. Context Manager considers the context of a subject based on Concepts consist of Subject and Object by ontological concepts. The Subject can be a user, application, or agent; that is, the Subject is various context elements generated by ubiquitous sensors. Object is the target data, system, or services that the Subject requests. Access Permission signifies the operation of a certain role of the Subject, whether access to a certain Object under certain Access Condition and Intended Goal is granted or denied. The Access Condition and Intended Goal are the constituent of the Access Permission. Access Condition consists of the six elements <Goal, Role, Action, Status, Location, Time>. The Access Condition is used to check whether the Context (5W1H) concepts of the

Overview of the CBDAC model.
The formalized definition of Role Assignment is as follows.
Definition 1 (role assignment).
(i) Subject Assignment SA ⊆ Subject × Role is a many-to-many mapping relationship between subjects and their assigned roles.
(ii) Role Assignment RA ⊆ Role ×
(iii) Roles ⊆ Role × Role are set of roles that define the function and relationship between roles.
The formalized definition and simple scenario of
Definition 2 (
).
CA
5W1H
Onto = {<Concept, Instance, Context> Concept = {<sub, obj> Instance = {<sub_element, obj_element> Context = {5W1H <Why, Who, What, Where, When, How>
Who: the subject assigned role, namely, an agent that may be a person, organization, or system involved in a context;
Why: the reason the context occurred;
How: the action leading to the context, namely, a context that may occur when it is acted upon by another entity that is often a human or software agent;
What: the access target (Object); Where: the location of the subject (including spatial information);
When: the time when the context occurred.
Simple Scenario. User A wants to transfer 100 dollars to friend B's account through the mobile banking system of bank C using a SmartPhone at 00:00 AM. The available time for credit transfer on the mobile banking system is from 00:10 AM to 11:50 PM.
By examining the above scenario, we can find that there are several contexts: (1) Concepts, such as User and Mobile_Banking_System; (2) Instances, such as User_A, Transfer_Process, Mobile_Banking_System_of_Bank_C, SmartPhone, and 00:00 AM; (3) Context between concepts, such as Credit_Transfer; (4) Condition, such as from 00:10 AM to 11:50 PM. The following represents the Context = {5W1H (Who, Why, How, What, Where, When)}:
Why = Credit_Transfer,
Who = User_A,
How = Transfer_Process,
What = Mobile_Banking_System_of_Bank_C,
Where = GPS & SmartPhone,
When = Start_Time (00:00 AM).
The formalized definition of Dynamic Access Control model for dynamic access permission is as follows.
Definition 3 (dynamic access control).
Dynamic Access Control DyAC = {Subject, Object, Access Permission} means that when the contexts are changed dynamically, the Subject is granted (or is denied) access to the Object by the Access Permission. In other words, the Access Permission is applied dynamically depending on the volatile context.
The formalized definition of Access Permission is as follows.
Definition 4 (access permission).
(i) Access Permission AP = {Context, Access Condition, Intended Goal} means an allowable condition whether Subject can access Object based on Context. This is not assigned to static roles but to conditional roles (such as Access Conditions). Subjects of context entities dynamically activate access conditions according to their context element (such as 5W1H) during the access process.
(ii) Access Permission Assignment APA ⊆ Context Manager × Access Permission determines access privileges by mapping the elements of Context Manager to the elements of Access Permission. The Subject is allowed to access the Object only if the context elements (5W1H) in
(iii) Access Conditions AC = {<goal, role, action, status, location, time>
Goal: the purpose of Object access and of performing context-based system;
Role: the acceptable Role set of Subject;
Action: the acting range performed by Context;
Status: the state of accessible Object;
Location: the range of accessible location and spatial information;
Time: the range of accessible time.
(iv) Intended Goal IG = {<aig, cig, pig>
AIG: the Allowable Intended Goal (AIG) is a goal always accessible through determination of who and why in
CIG: the Conditional Intended Goal (CIG) is a conditionally accessible goal only if Context of
PIG: the Prohibited Intended Goal (PIG) is a goal always prohibitive through determination of who and why in
(v) Context Access CA ⊆ Context × Object is a many-to-many mapping relationship between CA 5W1H Onto and Object.
(vi) Intended Goal Compliance IGC ⊆ APA ⋈ IG is a one-to-one relationship between each AP and Object, as well as bound IG.
A key feature of our proposed model is that it supports not only semantic context, but also dynamic access control. Thus, in this paragraph, we described the stage to provide function definitions to facilitate the discussion of CBDAC model using the context elements and its attributes.
Definition 5 (CBDAC model function).
(i) assigned_role: Subject → Role, the mapping of subject s onto a set of roles. Formally, assigned_role(s) = {r ∈ Role
(ii) access_goal_authorization: C → AP, the mapping of context c in
(iii) intended_goal_binding: Object → IG, the mapping of object o onto ig, which means finding the bound ig of the Object.
(iv) intended_goal_compliance: intended_goal_compliance(c, ac, ig) = Grant_Access iff c × ac ∈ AIG; intended_goal_compliance(c, ac, ig) = Conditionally_Grant_Access iff c × ac ∈ CIG; intended_goal_compliance(c, ac, ig) = Deny_Access iff c × ac ∈ PIG.
3.1. Mapping CA5W1HOnto and Access Condition
In order to support

Mapping relationship between
The Why element from
Mapping definition.
3.2. Dynamic Access Decision
The important challenge for implementing role-based and PBAC models (not context-based access control model) is that it may be difficult to infer the access purpose both accurately and efficiently. With our proposed CBDAC model, the access control strategy can be determined dynamically based on the context elements (such as 5W1H) and subject attributes, in addition to the objects and operations, using access control entities (such as goal, role, action, status, location, and time), and thus it is relatively easy to infer the dynamic access control of context expressivity both accurately and efficiently. Accordingly, we determine dynamic access control by means of Definitions 6, 7, and 8.
Definition 6 (context attribute).
Context Attributes are defined as the set of 5W1H properties linked to the granting (or denial) of AC. Let ContextAttribute denote the set of context attributes that consist of the values {5W1H (Why, Who, What, How, Where, When)}. Every Context c ∈ Context is associated with a set of context attributes denoted by c
n
=
Definition 7 (access condition attribute).
Access Condition Attributes are defined as the set of properties linked to granting in the context of the access control system. Let AccessConditionAttributes denote the set of AC attributes that consist of the values {goal, role, status, action, location, time}. Every ac ∈ AC is associated with a set of access condition attributes denoted by ac
n
=
Definition 8 (access condition operation).
As previously mentioned, the sets of Context and AC represent the set of defined context elements (5W1H) and AC elements (Goal, Role, Action, Status, Location, Time). Let the sets goal, role, action, status, location, and time represent the sets of predefined GoalAttribute, RoleAttribute, ActionAttribute, StatusAttribute, LocationAttribute, and TimeAttribute. In addition, X = GoalAttribute ∪ RoleAttribute ∪ ActionAttribute ∪ StatusAttribute ∪ LocationAttribut
We propose Algorithm 1 for dynamic access decision of the CBDAC model. The algorithm processes mapping between CHECK_CONDITION (c
i
, ac
j
) = <why
i
∷goal
j
, who
i
∷role
j
, how
i
∷action
j
, what
i
∷status
j
, where
i
∷location
j
, when
i
∷time
j
>.
(i) Access Requirement (ii) c, a set of context attribute (iii) ac, a set of access condition attribute (iv) ig, intended goal (1) (2) (3) i, j is the identification number of attributes (4) (5) CHECK_INTENDED_GOAL_COMPLIANCE( (6) (7) (8) (9) CHECK_CONDITION( (10) (11) (12) (13) (14) (15)
4. Use Case Scenario and Implementation
In this section, we describe a use case scenario of the CBDAC model to ensure the ability to provide responses for dynamic access control applying the mobile banking system. In addition, we describe an implementation that the CBDAC model is defined using ontology.
The DyAC is the triple set <Subject, Object, AP>. Using a use case scenario, we find that Subject becomes User, which generates Context in mobile_Banking_System, whereas Object is assigned to the Mobile_Banking_System as an access objective for the Context. The access permission of AP is determined by the Context element of the
The Goal of AC is the goal that the context is attempting to perform, which is Credit_Transfer, and the accessible Role is allocated only to user and System_Admin. Action is the Transfer_Process in Mobile_Banking_System_of_Bank_C, and Status is only accessible when the system is in the Activation state. Location indicates the scope of the accessible spatial information, which is defined by GPS, SmartPhone, or IP_Address. Time indicates the system-accessible time slot from 00:10 AM to 11:50 PM. The access to an object is only permitted if six elements of the contexts defined by AC have been satisfied. IG signifies the predetermined intended goal. It determines an access privilege based on the Subject and Context.
The following shows an example of DyAC based on scenario described above:
DyAC = {Subject → User; Object → Mobile_Banking_System; AP}; AP = {Context → Credit_Transfer; AC; IG → cig}; Context = {5W1H (Why, Who, How, What, Where, When)}; AC = {Goal, Role, Action, Status, Location, Time}:
Goal → Functional_Goal (Credit_Transfer), Role → Actor (User/System_Admin), Action → Atomic_Action (Transfer_Process), Status → Atomic_Status (Activation), Location → Atomic_Location (GPS/SmartPhone/IP_Address), Time → Start_Time (00:10 AM), End_Time (11:50 PM).
Table 2 describes the example of IG by DyAC. In the mobile banking system, Subject consists of departments (such as User, m-Banking_Department, Sales_Department, System_Admin, etc.); Context consists of Deposit, Credit_transfer, Open_account, Close_account, Account_Balance_Inquiry, and so forth. When the Subject is User, the User has access to Deposit, Credit_Transfer, Context, and Open_Account only if the context of user corresponds with a particular condition (i.e., AC is goal, role, action, status, location, and time). The access of User to Close_Account is denied because of pig, which is the intended goal of the user. On the other hand, the access of User to Account_Balance_Inquiry is always granted because of aig, which is the intended goal of the user. When the Subject is m-Banking_Dept., the access of m-Banking_Dept. to Deposit and Credit_Transfer is denied despite the correspondence with AC because of pig, which is intended goal of m-Banking_Dept. However, the access of m-Banking_Dept. to Open_Account, Close_Account, and Account_Balance_Inquiry is granted by cig only if the Context of e-Banking_Dept. corresponds with AC. When the Subject is Sales_Dept., the Sales_Dept. is allowed access to Open_Account only if the Context of Sales_Dept. corresponds with AC, but the Sales_Dept. is denied access to the other Context. When the Subject is System_Admin, the System_Admin is denied access to Account_Balance_Inquiry, but the access of System_Admin to the other Context is allowed only if the Context of Sales_Dept. corresponds with AC. Therefore, the Subject is User in DyAC, and the access of User for Credit_Transfer is allowed only if the Context of User corresponds with all AC.
Predetermined intended goal.
We implement the CBDAC model using Protégé [36, 37]. Figure 4 illustrates the hierarchical classes and instances in the CBDAC model. The class hierarchy shows overall classes and equivalent relation between the

A screenshot of the hierarchical structure and instances in the CBDAC model.
Based on the scenario presented above, a comparison is made to determine whether the Subject satisfies the access condition of the Object through the mapping of
Who
∷
Role compares to determine whether the value of Who is within the scope allowed to access by mapping User A of Who and the User/System_Admin of the Role as Who∷Role → User_A∷Actor (User/System_Admin). How∷Action conducts the comparison by mapping the Transfer_Process in the Mobile Banking System of How and the Transfer_Process in the Mobile Banking System of the Action. Because Credit_Transfer of the Mobile Banking System is a single process, mapping is performed as How∷Action → Transfer_Process∷Atomic_Action (Transfer_Process); it compares to determine whether Context is an executable process. What∷Status compares to determine at which status of the What value a permission for access is granted by mapping the Mobile_Banking_System_of_Bank_C of What and Activation of Status as What∷Status → Mobile_Banking_System_of_Bank_C∷Atomic_Status (Activation). That is, access is permitted only when the Mobile_Banking_System_of_Bank_C is in the state of Activation. Where∷Location compares to determine whether the value of Where is within the accessible Location range by mapping the GPS and SmartPhone values of Where and the GPS, SmartPhone, and IP_Address values of Location. Because Credit_Transfer makes access at a specific location or through a specific device, the access permission scope is Atomic_Location and it is expressed as Where∷Location → GPS and SmartPhone∷GPS and Atomic_Location (SmartPhone/IP_Address). Finally, When∷Time compares to determine whether the value of When is within the allowed time slot by mapping the Start_Time (00:00 AM) of When and End_Time (11:50 PM). It is expressed as When∷Time → Start_Time (00:00 AM)∷Start_Time (00:10 AM), End_Time (11:50 PM):
Why∷Goal → Credit_Transfer∷ Functional_Goal (Credit_Transfer), Who∷Role → User_A∷Actor (User/System_Admin), How∷Action → Transfer_Process∷ Atomic_Action (Transfer_Process), What∷Status→Mobile_Banking_System_of_Bank_C∷ Atomic_Status (Activation), Where∷Location → GPS & SmartPhone∷GPS & Atomic_Location (SmartPhone/IP_Address), When∷Time → Start_Time (00:00 AM) ∷ Start_Time (00:10 AM), End_Time (11:50 PM).
As shown in the comparison, Start_Time (00:00 AM) of When does not correspond with the range of accessible time from Start_Time (00:10 AM) to End_Time (11:50 PM) on When∷Time. Consequently, User_A is denied access to the function Credit_Transfer in Mobile_Banking_System_of_Bank_C because the User_A does not have permissible authority for the function Credit_Transfer in Mobile_Banking_System_of_Bank_C using SmartPhone at 00:00 AM.
Figure 5 shows the CBDAC model by ontological concepts including classes, instances, and their relationship. Yellow circle represents each class, and the purple circle indicates each instance using the NavigOwl that is a visualization tool Ontology [37]. Further, an arrow indicates each relationship. Our model can be applied and depicted in a real-life scenario using ontological concept. Therefore, we ensure the ability of the CBDAC model to provide correct responses by representing dynamic access decision with a real-life banking system scenario.

A screenshot of the overall CBDAC model.
5. Conclusion
In this paper, we proposed an access control model for privacy protection based on context in USN named the
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This research was supported by a Korea University Grant and the basic Science Research Program through the National Research Foundation of Korea (NRF), funded by the Ministry of Education, Science and Technology (2011-0025588), and the Next-Generation Information Computing Development Program through the NRF funded by the Ministry of Science, ICT & Future Planning (2012M3C4A7033346), and the NRF Joint Research Program (2013-054401).
