The R*-tree: an efficient and robust access method for points and rectangles
SIGMOD '90 Proceedings of the 1990 ACM SIGMOD international conference on Management of data
A Context-Aware Security Architecture for Emerging Applications
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Context Authentication Using Constrained Channels
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
A gesture-based authentication scheme for untrusted public terminals
Proceedings of the 17th annual ACM symposium on User interface software and technology
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Supporting location-based conditions in access control policies
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Access Control and Privacy in Location-Aware Services forMobile Organizations
MDM '06 Proceedings of the 7th International Conference on Mobile Data Management
Location-Aware Authentication and Access Control—Concepts and Issues
AINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications
Laissez-faire file sharing: access control designed for individuals at the endpoints
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Auth-SL: a system for the specification and enforcement of quality-based authentication policies
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Proceedings of the 8th international conference on Mobile systems, applications, and services
Approaches and Issues in Location-Aware Continuous Authentication
CSE '10 Proceedings of the 2010 13th IEEE International Conference on Computational Science and Engineering
Rumpole: a flexible break-glass access control model
Proceedings of the 16th ACM symposium on Access control models and technologies
Smart phone use by non-mobile business users
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
Attribute-Based authentication model for dynamic mobile environments
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Hi-index | 0.00 |
The Runtime Adaptive Multi-factor authentication ENvironment (RAMEN) is a client and server-side framework that provides multi-factor authentication policy enforcement for mobile devices running iOS® and Android®. On the client side, RAMEN uses a security manager that can intercept network calls and forward them for secure authentication to a server-side proxy. The server-side proxy contains a dynamic policy engine that can be configured to choose between different authentication methods depending on the mobile context. RAMEN is an extensible framework that has interfaces to plug in different authentication methods. We describe the policy model and implementation of RAMEN. We show the value of RAMEN to developers through an implementation of location-aware security policies that can be set up to enforce security zones that relax or enhance security requirements for different applications.