International Workshop on
Ubiquitous Access Control

Important Dates

Paper Submission Deadline (EXTENDED):
April 18, 2006
Notification of Acceptance:
May 10, 2006
Camera-Ready Submissions:
May 30, 2006

Co-organizers and TPC chairs:

Ramiro Liscano
University of Ontario, Oshawa, Canada

Stefano Salsano
University of Roma "Tor Vergata", Italy

Technical Program Committee

Selim Aissi
Intel Corporation, US

Mahbubul Alam
Cisco Systems, San Jose, USA

Michel Barbeau
Carleton University, Ottawa, Canada

Tim Finin
University of Maryland, Baltimore County, USA

Patrick Hung
University of Ontario, Oshawa, Canada

Anupam Joshi
University of Maryland, Baltimore County, USA

Lalana Kagal

Larry Korba
National Research Council, Ottawa, Canada

Markus Muck
Motorola Labs, France

Filip Perich
Shared Spectrum Company, USA

Anand Prasad
Docomo Eurolab, Munich, Germany

Neeli Prasad
Aalborg University, Demmark

George Prezerakos
Technological Education Institute of Piraeus, Greece

Fabio Ricciato
Telecommunications Research Center Vienna (ftw.), Austria

Simon Pietro Romano
Universita' di Napoli Federico II, Italy

Enrico Rukzio
Ludwig Maximilians University Munich, Germany

Michael Smirnov
Fraunhofer FOKUS, Germany

Nick Tselikas
National Technical University of Athens, Greece

Miquel Vargas
University of Ontario, Oshawa, Canada

Luca Veltri
University of Parma, Italy

Lixia Zhang

Ubiquitous Access Control

July 17, 2006 - San Jose, California, USA
To be held in conjunction with:
The 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networks and Services (MOBIQUITOUS 2006)

Accepted papers will be published in the conference proceedings and the IEEE Digital Library

Technical Program
 with links to presentations


The access to resources or services located in “foreign” environments and owned by disparate entities is a painful process for mobile users. This is a significant deterrent to the ability to easily interconnect in a secure and spontaneous manner among disparate organizations. In fact, corporate wireless networks are generally run with severe access policies that do not offer access to guests. Public wireless networks typically do not support roaming agreements, so that users have to be a customer of the specific network provider or to “instantly” (and costly) buy access.

Coalition access control encompasses mechanisms dealing with access between users and services of two or more different security domains. These mechanism are typically based on contractually or implicitly agreed collaboration between organizations. They are targeted to medium or long-term periods of inter-organizational coalition. Some real examples are supply chain management, international joint projects, logistics service, etc. The overhead to set up these mechanisms can be significant, as the access control mechanisms for resources of the participating partners require common inter-organizational agreements. The inter-provider agreements that allow users to roam across different wireless providers can be seen as a form of coalition access control. Work on the definition of architecture and protocols for inter-provider roaming is ongoing in several standardization fora or industry initiatives (3GPP, ETSI, ECMA, IRAP …)

Spontaneous coalition access control investigates access mechanisms based on informally formed coalition scenarios. These informal coalition scenarios are strongly connected to particular contextual situations: for example communication sessions like calls, conferencing, and Instant Messaging (IM) or informal physical contacts that occur in meeting rooms, offices, and hallways. It is not possible to establish traditional “formal” cross-organizational agreements within these spontaneous coalition encounters. Anyway, access to local resources still need to respect corporate access policies. The notion of spontaneous coalition access implies an increase in the number of un-verified access points and presents a serious security issue. User mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. Devices that participate in spontaneous coalition scenarios can introduce “new” foreign services into the environment; due to their mobility these device can change location changing the availability of resources and services un-predictably. Access control to resources is crucial to leverage the provision of ubiquitous services and calls for novel solutions based on various context information, e.g., user/device location, device properties, user needs, local resource visibility.  

Call for Submissions

The workshop is interested in contributions addressing areas associated with mobile and ubiquitous architectures, infrastructure, data and services as related to Ubiquitous Access Control. Under the “Ubiquitous Access Control” definition, we encompass both the “traditional” inter-provider roaming scenarios and the more advanced “spontaneous coalition” scenarios. The workshop will bring together the more “practical” aspects of the former scenario with the more advanced research aspects of the latter.

Technical papers describing original, previously unpublished research, are solicited. Tutorial paper or papers reporting experiences of deployed systems or demonstrators are also welcome. The papers cannot be currently under review by another conference or journal.

 Topics include, but are not limited to the following:

  • Integration of Contextual Models with Security Models.
  • Models for Authentication, Trust, Authorization and Access Control in Ubiquitous Computing Environments.
  • Coalition Access Control Models.
  • Ontologies for Security Policies.
  • Distributed Access Control Architectures and Models.
  • Access Control and Trust Models for Ubiquitous Devices
  • Group management for ad-hoc communities
  • Peer discovery in Ubiquitous Computing Environment
  • Architecture and protocols for inter provider roaming in wireless networks
  • Experiences and test-beds for inter provider roaming

Research links on Ubiquitous Access Control

How to submit a paper

Paper submission will be handled electronically by the COCUS Conference Management System. In order to submit a paper you must first create a COCUS account.

  • Go the COCUS web site:
  • Click on Register. Once you have an account, login and click on Event List.
  • Scroll down to International Workshop on Ubiquitous Access Control – IWUAC.
  • Choose the Submit Paper Link.

Formatting guidelines

Authors should prepare an Adobe Acrobat PDF version of their paper. Papers must be in English and not exceed 8 pages double column in IEEE conference format (US Letter size, 8.5 x 11 inches) including text, figures and references. The font size must be 10 points. Please follow the IEEE conference paper format as given in these templates: MS Word, LaTeX (Unix), or LaTeX (MS Windows). See sample manuscript as a visual aid for formatting and styles.

Updated by: Stefano Salsano,