A Context-Aware Security Architecture for Emerging Applications
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
Reasoning about Uncertain Contexts in Pervasive Computing Environments
IEEE Pervasive Computing
MiddleWhere: a middleware for location awareness in ubiquitous computing applications
Proceedings of the 5th ACM/IFIP/USENIX international conference on Middleware
Context sensitive access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Adaptive trust negotiation and access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Negotiated Security Policies for E-Services and Web Services
ICWS '05 Proceedings of the IEEE International Conference on Web Services
The trouble with login: on usability and computer security in ubiquitous computing
Personal and Ubiquitous Computing
The case for transient authentication
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
On the Brittleness of Software and the Infeasibility of Security Metrics
IEEE Security and Privacy
Usability and privacy in identity management architectures
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
A generic framework for context-based distributed authorizations
CONTEXT'03 Proceedings of the 4th international and interdisciplinary conference on Modeling and using context
A context management framework for supporting context-aware distributed applications
IEEE Communications Magazine
Electronic Notes in Theoretical Computer Science (ENTCS)
Hi-index | 0.00 |
We exploit the ability to sense and use context information to augment or replace the traditional static security measures by making them more adaptable to a given context and thereby less intrusive. We demonstrate that by fusing location information obtained from various sources that are associated to the user and are available over time, the confidence in the identity of the user can be increased considerably. In fact, the level of confidence in the identity of the user is related to the probability that the user is at a certain location. This probability is used as a measure to parameterize the authentication level of the user making it thereby much more adaptive to changing situational circumstances. In this paper we describe the theoretical background for a context-sensitive adaptation of authentication and the design and validation of the system that we have developed to adaptively authenticate a user on the basis of the location of his sensed identity tokens.