In the future, a largely invisible and ubiquitous computing infrastructure
will assist people with a variety of activities in the home
and at work. The applications that will be deployed in such systems
will create and manipulate private information and will provide access
to a variety of other resources. Securing such applications is
challenging for a number of reasons. Unlike traditional systems
where access control has been explored, access decisions may depend
on the context in which requests are made. We show how
the well-developed notion of roles can be used to capture securityrelevant
context of the environment in which access requests are
made. By introducing environment roles, we create a uniform access
control framework that can be used to secure context-aware
applications. We also present a security architecture that supports
security policies that make use of environment roles to control access
to resources.
%0 Conference Paper
%1 covington2001
%A Covington, Michael J.
%A Long, Wende
%A Srinivasan, Srividhya
%A Dey, Anind K.
%A Ahamad, Mustaque
%A Abowd, Gregory D.
%B SACMAT '01: Proceedings of the sixth ACM symposium on Access
control models and technologies
%C New York, NY, USA
%D 2001
%I ACM Press
%K imported
%P 10--20
%R http://doi.acm.org/10.1145/373256.373258
%T Securing Context-aware Applications Using Environment Roles
%X In the future, a largely invisible and ubiquitous computing infrastructure
will assist people with a variety of activities in the home
and at work. The applications that will be deployed in such systems
will create and manipulate private information and will provide access
to a variety of other resources. Securing such applications is
challenging for a number of reasons. Unlike traditional systems
where access control has been explored, access decisions may depend
on the context in which requests are made. We show how
the well-developed notion of roles can be used to capture securityrelevant
context of the environment in which access requests are
made. By introducing environment roles, we create a uniform access
control framework that can be used to secure context-aware
applications. We also present a security architecture that supports
security policies that make use of environment roles to control access
to resources.
%@ 1-58113-350-2
@inproceedings{covington2001,
abstract = {In the future, a largely invisible and ubiquitous computing infrastructure
will assist people with a variety of activities in the home
and at work. The applications that will be deployed in such systems
will create and manipulate private information and will provide access
to a variety of other resources. Securing such applications is
challenging for a number of reasons. Unlike traditional systems
where access control has been explored, access decisions may depend
on the context in which requests are made. We show how
the well-developed notion of roles can be used to capture securityrelevant
context of the environment in which access requests are
made. By introducing environment roles, we create a uniform access
control framework that can be used to secure context-aware
applications. We also present a security architecture that supports
security policies that make use of environment roles to control access
to resources.},
added-at = {2007-05-04T05:48:10.000+0200},
address = {New York, NY, USA},
author = {Covington, Michael J. and Long, Wende and Srinivasan, Srividhya and Dey, Anind K. and Ahamad, Mustaque and Abowd, Gregory D.},
biburl = {https://www.bibsonomy.org/bibtex/2bb0cd252406b3ddbf33cf898871a88ff/p_ansell},
booktitle = {{SACMAT} '01: Proceedings of the sixth {ACM} symposium on Access
control models and technologies},
description = {Context-aware business processes},
doi = {http://doi.acm.org/10.1145/373256.373258},
interhash = {bf2f4f3aae08d259dbc45e529fc89633},
intrahash = {bb0cd252406b3ddbf33cf898871a88ff},
isbn = {1-58113-350-2},
keywords = {imported},
location = {Chantilly, Virginia, United States},
owner = {peter},
pages = {10--20},
pdf = {HonoursResearch/Covington2001-SecuringContextAwareApplicationsUsingEnvironmentalRoles.pdf},
publisher = {ACM Press},
timestamp = {2007-05-04T05:48:11.000+0200},
title = {Securing Context-aware Applications Using Environment Roles},
year = 2001
}