Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies 2001
DOI: 10.1145/373256.373258
|View full text |Cite
|
Sign up to set email alerts
|

Securing context-aware applications using environment roles

Abstract: In the future, a largely invisible and ubiquitous computing infrastructure will assist people with a variety of activities in the home and at work. The applications that will be deployed in such systems will create and manipulate private information and will provide access to a variety of other resources. Securing such applications is challenging for a number of reasons. Unlike traditional systems where access control has been explored, access decisions may depend on the context in which requests are made. We … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
207
0
5

Year Published

2004
2004
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 326 publications
(212 citation statements)
references
References 12 publications
0
207
0
5
Order By: Relevance
“…Generalized RBAC model (GRBAC) [1] define environmental role to control access to private information and resources in ubiquitous computing applications. Permission to assign role is associated with set of environmental role in GRBAC and environmental properties such as time and location influence to role activation.…”
Section: Related Workmentioning
confidence: 99%
“…Generalized RBAC model (GRBAC) [1] define environmental role to control access to private information and resources in ubiquitous computing applications. Permission to assign role is associated with set of environmental role in GRBAC and environmental properties such as time and location influence to role activation.…”
Section: Related Workmentioning
confidence: 99%
“…Otherwise, the access is denied. It is called Location-based Access Control (LBAC) [2,6,7], which provides more reliable access control when combined with traditional methods. In addition, it offers the ability to trace an intruder back to a physical location if some intrusion has been detected.…”
Section: Introductionmentioning
confidence: 99%
“…Besides defining triggering actions [22] of pervasive applications (e.g., a smart meeting room), a logical language provides a way to infer high-level context information [13,19], such as a user's activity, from raw sensor data. One promising application of the logic-based approach is a context-sensitive authorization system [1,2,6,8,11,18,24] that considers a requester's context as well as his identity to make a granting decision; the system derives the granting decision (true or false) with a set of rules encoding policies and facts encoding context information.…”
Section: Introductionmentioning
confidence: 99%