Understanding and Using Context
Personal and Ubiquitous Computing
A Middleware Infrastructure for Active Spaces
IEEE Pervasive Computing
On context in authorization policy
Proceedings of the eighth ACM symposium on Access control models and technologies
A Model for Attribute-Based User-Role Assignment
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Methods for Conflict Resolution in Policy-Based Management Systems
EDOC '03 Proceedings of the 7th International Conference on Enterprise Distributed Object Computing
Modeling Context-Based Security Policies with Contextual Graphs
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Context-sensitive Access Control Model and Implementation
CIT '05 Proceedings of the The Fifth International Conference on Computer and Information Technology
Provisions and obligations in policy management and security applications
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Hi-index | 0.00 |
High heterogeneity and dynamicity of pervasive computing environments introduces requirement of more flexible and functional access control policies. The notion of provisional actions has been defined previously to overcome the insufficient grant/denial response to an access request and has been incorporated in the provision-based access control model (PBAC). Based on PBAC, we propose a context-aware provision-based access control model, capable of dynamic adaptation of access control policy according to the changing context. In particular, the model facilitates the definition of context-aware policies and enriches the access control by enforcing provisional actions in addition to common permissions.