2005
DOI: 10.1007/978-3-540-32004-3_15
|View full text |Cite
|
Sign up to set email alerts
|

Supporting Dynamically Changing Authorizations in Pervasive Communication Systems

Abstract: In pervasive computing environments, changes in context may trigger changes in an individual's access permissions. We contend that existing access control frameworks do not provide the fine-grained revocation needed to enforce these changing authorizations. In this paper, we present an authorization framework, in the context of the Gaia OS for active spaces, which integrates context with authorization and provides fine-grained control over the enforcement of dynamically changing permissions using cryptographic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…With the event service, users can create secure event channels where channel participants are restricted to authorized entities and sensitive events are encrypted, as described in Lee et al (2005). All relevant sensor components within the smart space infrastructure are connected through a special secure event channel as depicted in Fig.…”
Section: Event Servicementioning
confidence: 99%
“…With the event service, users can create secure event channels where channel participants are restricted to authorized entities and sensitive events are encrypted, as described in Lee et al (2005). All relevant sensor components within the smart space infrastructure are connected through a special secure event channel as depicted in Fig.…”
Section: Event Servicementioning
confidence: 99%
“…The only systems of which we are aware that implement access control of this sort are those of Lee, et al [38] and White, et al [39], which both implement what we will call the "event-based" model. We will consider other methods of enforcement and develop a taxonomy for them in Section 4.…”
Section: Related Workmentioning
confidence: 99%
“…For example, a process is either permitted to open a file for reading, or it is not; there is no option to control the period of time (for example) for which the file may be open. Access control systems with continuing actions appear to have inspired interest only very recently [27,38,39].…”
Section: Access Control For Non-instantaneous Actionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Lee et al [2] present an access control architecture that integrates context with authorization and provides fine-grained control over the enforcement of dynamically changing permissions. However, integration with group communication systems (GCS) is not discussed which will be discussed further in Section4.…”
Section: Integrated Modelsmentioning
confidence: 99%