Role-Based Access Control Models
Computer
The way of Z: practical programming with formal methods
The way of Z: practical programming with formal methods
Measuring usability: are effectiveness, efficiency, and satisfaction really correlated?
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
A scenario-driven role engineering process for functional RBAC roles
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A Formal Model for Role-Based Access Control with Constraints
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Formal Z Specifications of Several Flat Role-Based Access Control Models
SEW '06 Proceedings of the 30th Annual IEEE/NASA Software Engineering Workshop
Lessons learned from the deployment of a smartphone-based access-control system
Proceedings of the 3rd symposium on Usable privacy and security
A user study of policy creation in a flexible access-control system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Expandable grids for visualizing and authoring computer security policies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Context-aware role-based access control in pervasive computing systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Handbook of Usability TestingXXX: Howto Plan, Design, and Conduct Effective Tests
Handbook of Usability TestingXXX: Howto Plan, Design, and Conduct Effective Tests
Access Control for Home Data Sharing: Attitudes, Needs and Practices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy-aware role-based access control
ACM Transactions on Information and System Security (TISSEC)
Exploring reactive access control
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Interfaces for the ordinary user: can we hide too much?
Communications of the ACM
Hi-index | 0.00 |
We propose a novel access control approach for pervasive computing environments. Sentential Access Control uses a constructed language similar to rudimentary English as the basis for intuitive context-aware security policy specification. The elements of sentences in this language map directly to fundamental security abstractions that allow us to apply our approach to many different access control implementations while still being sufficiently expressive and understandable for the user. We describe our model both informally and formally, and show a prototype application for smartphones that uses our approach to implement reactive access control.