@p_ansell

Securing Context-aware Applications Using Environment Roles

, , , , , and . SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies, page 10--20. New York, NY, USA, ACM Press, (2001)
DOI: http://doi.acm.org/10.1145/373256.373258

Abstract

In the future, a largely invisible and ubiquitous computing infrastructure will assist people with a variety of activities in the home and at work. The applications that will be deployed in such systems will create and manipulate private information and will provide access to a variety of other resources. Securing such applications is challenging for a number of reasons. Unlike traditional systems where access control has been explored, access decisions may depend on the context in which requests are made. We show how the well-developed notion of roles can be used to capture securityrelevant context of the environment in which access requests are made. By introducing environment roles, we create a uniform access control framework that can be used to secure context-aware applications. We also present a security architecture that supports security policies that make use of environment roles to control access to resources.

Description

Context-aware business processes

Links and resources

Tags

community

  • @kdubiq
  • @p_ansell
  • @dblp
@p_ansell's tags highlighted