A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
A Context-Sensitive Access Control Model and Prototype Implementation
Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures
Context Authentication Using Constrained Channels
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
The many faces of publish/subscribe
ACM Computing Surveys (CSUR)
Communications of the ACM - The disappearing computer
Context sensitive access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Service-oriented device communications using the devices profile for web services
MPAC '05 Proceedings of the 3rd international workshop on Middleware for pervasive and ad-hoc computing
Access control in publish/subscribe systems
Proceedings of the second international conference on Distributed event-based systems
SLCA, composite services for ubiquitous computing
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Context-Aware access control mechanism for ubiquitous applications
AWIC'05 Proceedings of the Third international conference on Advances in Web Intelligence
Benefits of Location-Based Access Control: A Literature Study
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Hi-index | 0.00 |
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trust users once they have authenticated, despite the fact that they may reach unauthorized situations. We analyse how dynamic information can be used to improve security in the authorization process, and what are the implications when applied to interaction patterns. We experiment and validate our approach using context as an authorization factor for eventing in Web service for device (like UPnP or DPWS).