Access control for collaborative environments
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Role-Based Access Control Models
Computer
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
Role templates for content-based access control
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A Temporal Access Control Mechanism for Database Systems
IEEE Transactions on Knowledge and Data Engineering
Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control
VLDB '96 Proceedings of the 22th International Conference on Very Large Data Bases
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Context sensitivity in role-based access control
ACM SIGOPS Operating Systems Review
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
An approach to engineer and enforce context constraints in an RBAC environment
Proceedings of the eighth ACM symposium on Access control models and technologies
Cerberus: A Context-Aware Security Scheme for Smart Spaces
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Location history in a low-cost context awareness environment
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Meta-Policies for Distributed Role-Based Access Control Systems
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Implementing access control to people location information
Proceedings of the ninth ACM symposium on Access control models and technologies
Role-based access control in ambient and remote space
Proceedings of the ninth ACM symposium on Access control models and technologies
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
Context-Based Access Control for Ubiquitous Service Provisioning
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Data protection and data sharing in telematics
Mobile Networks and Applications
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Access control in collaborative systems
ACM Computing Surveys (CSUR)
GEO-RBAC: a spatially aware RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
Context sensitive access control
Proceedings of the tenth ACM symposium on Access control models and technologies
IEEE Transactions on Dependable and Secure Computing
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Proceedings of the 7th international conference on Human computer interaction with mobile devices & services
Access control to people location information
ACM Transactions on Information and System Security (TISSEC)
A specification model for context-based collaborative applications
Pervasive and Mobile Computing
Secure context-sensitive authorization
Pervasive and Mobile Computing
Integrating presence inference into trust management for ubiquitous systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
A usage-based authorization framework for collaborative computing systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Sharing digital rights with domain licensing
Proceedings of the 4th ACM international workshop on Contents protection and security
GEO-RBAC: A spatially aware RBAC
ACM Transactions on Information and System Security (TISSEC)
Towards secure resource sharing for impromptu collaboration in pervasive computing
Proceedings of the 2007 ACM symposium on Applied computing
Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees
Proceedings of the 12th ACM symposium on Access control models and technologies
Toward a Usage-Based Security Framework for Collaborative Computing Systems
ACM Transactions on Information and System Security (TISSEC)
MCSE: a multimedia context-based security engine
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Location constraints in digital rights management
Computer Communications
Data security in location-aware applications: an approach based on RBAC
International Journal of Information and Computer Security
Service sharing with trust in pervasive environment: now it's time to break the jinx
Proceedings of the 2008 ACM symposium on Applied computing
On spatio-temporal constraints and inheritance in role-based access control
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Making place for clutter and other ideas of home
ACM Transactions on Computer-Human Interaction (TOCHI)
Context-aware role-based access control in pervasive computing systems
Proceedings of the 13th ACM symposium on Access control models and technologies
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Spatial Domains for the Administration of Location-based Access Control Policies
Journal of Network and Systems Management
Enabling ubiquitous patient monitoring: Model, decision protocols, opportunities and challenges
Decision Support Systems
Security and privacy for geospatial data: concepts and research directions
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Enforcing role based access control model with multimedia signatures
Journal of Systems Architecture: the EUROMICRO Journal
Role Based Access Control with Spatiotemporal Context for Mobile Applications
Transactions on Computational Science IV
A statistical indoor localization method for supporting location-based access control
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Ensuring spatio-temporal access control for real-world applications
Proceedings of the 14th ACM symposium on Access control models and technologies
Information protection via environmental data tethers
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
XML-based policy specification framework for spatiotemporal access control
Proceedings of the 2nd international conference on Security of information and networks
Paralocks: role-based information flow control and beyond
Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A Statistical Indoor Localization Method for Supporting Location-based Access Control
Mobile Networks and Applications
A generic framework for context-based distributed authorizations
CONTEXT'03 Proceedings of the 4th international and interdisciplinary conference on Modeling and using context
Secure spaces: protecting freedom of information access in public places
ICOST'07 Proceedings of the 5th international conference on Smart homes and health telematics
A spatio-temporal role-based access control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Context-aware security management system for pervasive computing environment
CONTEXT'07 Proceedings of the 6th international and interdisciplinary conference on Modeling and using context
A software framework for autonomic security in pervasive environments
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Context RBAC/MAC access control for ubiquitous environment
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
STARBAC: spatiotemporal role based access control
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
On the consistency of distributed proofs with hidden subtrees
ACM Transactions on Information and System Security (TISSEC)
Enforcing spatial constraints for mobile RBAC systems
Proceedings of the 15th ACM symposium on Access control models and technologies
A security framework for a workflow-based grid development platform
Computer Standards & Interfaces
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment
Wireless Personal Communications: An International Journal
Access control in personal localized semantic information spaces
ruSMART/NEW2AN'10 Proceedings of the Third conference on Smart Spaces and next generation wired, and 10th international conference on Wireless networking
An intelligent information sharing control system for dynamic collaborations
Proceedings of the 8th International Conference on Frontiers of Information Technology
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
Dynamic deployment of context-aware access control policies for constrained security devices
Journal of Systems and Software
Contextualizing security for digital long-term preservation
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
A Generative Programming Framework for Context-Aware CSCW Applications
ACM Transactions on Software Engineering and Methodology (TOSEM)
Context-Role based access control for context-aware application
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Prox-RBAC: a proximity-based spatially aware RBAC
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Scalability in a secure distributed proof system
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
LoT-RBAC: a location and time-based RBAC model
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
Distributed processing of context-aware authorization in ubiquitous computing environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
A semantic context-aware access control in pervasive environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
ISWC'06 Proceedings of the 5th international conference on The Semantic Web
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Context-Aware access control mechanism for ubiquitous applications
AWIC'05 Proceedings of the Third international conference on Advances in Web Intelligence
A contextual attribute-based access control model
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Spatial context in role-based access control
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
LRBAC: a location-aware role-based access control model
ICISS'06 Proceedings of the Second international conference on Information Systems Security
ASRBAC: a security administration model for mobile autonomic networks (MAutoNets)
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Attribute-Based authentication model for dynamic mobile environments
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Datalog for security, privacy and trust
Datalog'10 Proceedings of the First international conference on Datalog Reloaded
Development of mobile hybrid medintegraweb app for interoperation between u-RPMS and HIS
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part III
Situation-based policy enforcement
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
SecuriTAS: a tool for engineering adaptive security
Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering
Architecture of context-aware integrated security management systems for smart home environment
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
RABAC: role-centric attribute-based access control
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Context-awareness: exploring the imperative shared context of security and ubiquitous computing
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services
Information Systems and e-Business Management
Proceedings of the 18th ACM symposium on Access control models and technologies
CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Future Generation Computer Systems
Hi-index | 0.00 |
In the future, a largely invisible and ubiquitous computing infrastructure will assist people with a variety of activities in the home and at work. The applications that will be deployed in such systems will create and manipulate private information and will provide access to a variety of other resources. Securing such applications is challenging for a number of reasons. Unlike traditional systems where access control has been explored, access decisions may depend on the context in which requests are made. We show how the well-developed notion of roles can be used to capture security-relevant context of the environment in which access requests are made. By introducing environment roles, we create a uniform access control framework that can be used to secure context-aware applications. We also present a security architecture that supports security policies that make use of environment roles to control access to resources.