Proceedings of the 6th International Conference on Mobile Technology, Application &Amp; Systems - Mobility '09 2009
DOI: 10.1145/1710035.1710055
|View full text |Cite
|
Sign up to set email alerts
|

Context-sensitive authorization in interaction patterns

Abstract: Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trust users once they have authenticated, despite the fact that they may reach unauthorized situations. We analyse how dynamic information can be used to improve security in the authorization process, and what are the implications when applied to interaction patterns. We experiment and validate our approach using context as an authorizati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2012
2012

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…Pervasive or ubiquitous systems, that use sensors, wireless transmissions and/or movable devices, differ from normal systems in their access control requirements. User actions should affect access control on objects [37] and because the actions are determined by specific locations, this provides a motivation for LBAC.…”
Section: A It Contextmentioning
confidence: 99%
“…Pervasive or ubiquitous systems, that use sensors, wireless transmissions and/or movable devices, differ from normal systems in their access control requirements. User actions should affect access control on objects [37] and because the actions are determined by specific locations, this provides a motivation for LBAC.…”
Section: A It Contextmentioning
confidence: 99%