Inside Java 2 platform security architecture, API design, and implementation
Inside Java 2 platform security architecture, API design, and implementation
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Flexible team-based access control using contexts
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A Policy Language for a Pervasive Computing Environment
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
KAoS Policy Management for Semantic Web Services
IEEE Intelligent Systems
Contextualizing Applications via Semantic Middleware
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Human-Computer Interaction
Ubiquitous security for ubiquitous computing
Information Security Tech. Report
Trust-enhanced Security in Location-based Adaptive Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
MCSE: a multimedia context-based security engine
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Service sharing with trust in pervasive environment: now it's time to break the jinx
Proceedings of the 2008 ACM symposium on Applied computing
Capturing Semantics for Information Security and Privacy Assurance
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Distributed Defeasible Contextual Reasoning in Ambient Computing
AmI '08 Proceedings of the European Conference on Ambient Intelligence
Enforcing role based access control model with multimedia signatures
Journal of Systems Architecture: the EUROMICRO Journal
Working set-based access control for network file systems
Proceedings of the 14th ACM symposium on Access control models and technologies
The Design of a New Policy Model to Support Ontology-Driven Reasoning for Autonomic Networking
Journal of Network and Systems Management
Reasoning about Relations with Dependent Types: Application to Context-Aware Applications
ISMIS '09 Proceedings of the 18th International Symposium on Foundations of Intelligent Systems
Middleware for pervasive spaces: balancing privacy and utility
Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware
A semantic approach for building pervasive spaces
Proceedings of the 6th Middleware Doctoral Symposium
A generalized context-based access control model for pervasive environments
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Enabling secure service discovery in mobile healthcare enterprise networks
IEEE Wireless Communications - Special issue title on applications and support technical for mobility and enterprise services
A context-aware middleware for real-time semantic enrichment of distributed multimedia metadata
Multimedia Tools and Applications
Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems
Mobile Networks and Applications
A role and attribute based access control system using semantic web technologies
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Middleware for pervasive spaces: balancing privacy and utility
Middleware'09 Proceedings of the ACM/IFIP/USENIX 10th international conference on Middleware
A novel access control framework for secure pervasive computing
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Enforcing security in semantics driven policy based networks
Computer Standards & Interfaces
Rule-based contextual reasoning in ambient intelligence
RuleML'10 Proceedings of the 2010 international conference on Semantic web rules
An intelligent information sharing control system for dynamic collaborations
Proceedings of the 8th International Conference on Frontiers of Information Technology
Benefits of Location-Based Access Control: A Literature Study
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Dynamic deployment of context-aware access control policies for constrained security devices
Journal of Systems and Software
OWL 2 modeling and reasoning with complex human activities
Pervasive and Mobile Computing
Enabling privacy-preserving semantic presence in instant messaging systems
CONTEXT'11 Proceedings of the 7th international and interdisciplinary conference on Modeling and using context
A semantic policy sharing and adaptation infrastructure for pervasive communities
Proceedings of the 21st international conference companion on World Wide Web
Ubiquitous access control for SPARQL endpoints: lessons learned and future challenges
Proceedings of the 21st international conference companion on World Wide Web
SHI3LD: an access control framework for the mobile web of data
Proceedings of the 23rd ACM conference on Hypertext and social media
A semantic policy sharing infrastructure for pervasive communities
ESWC'12 Proceedings of the 9th international conference on The Semantic Web: research and applications
ICAF: a context-aware framework for access control
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
A rule-based contextual reasoning platform for ambient intelligence environments
RuleML'13 Proceedings of the 7th international conference on Theory, Practice, and Applications of Rules on the Web
An evidential fusion approach for activity recognition in ambient intelligence environments
Robotics and Autonomous Systems
NooSphere: an activity-centric infrastructure for distributed interaction
Proceedings of the 12th International Conference on Mobile and Ubiquitous Multimedia
Behavior-based access control for distributed healthcare systems
Journal of Computer Security
Hi-index | 0.00 |
Wireless connectivity and widespread diffusion of portable devices offer novel opportunities for users to share resources anywhere and anytime, and to form ad-hoc coalitions. Resource access control is crucial to leverage these ad-hoc collaborations. In pervasive scenarios, however, collaborating entities cannot be predetermined and resource availability frequently varies, even unpredictably, due to user/device mobility, thus complicating resource access control. Access control policies cannot be defined based on entity’s identities/roles, as in traditional access control solutions, or be specified a priori to face any operative run time condition, but require continuous adjustments to adapt to the current situation. To address these issues, this paper advocates the adoption of novel access control policy models that follow two main design guidelines: context-awareness to control resource access on the basis of context visibility and to enable dynamic adaptation of policies depending on context changes, and semantic technologies for context/policy specification to allow high-level description and reasoning about context and policies. The paper also describes the design of a semantic context-aware policy model that adopts ontologies and rules to express context and context-aware access control policies and supports policy adaptation.