Information exposure control through data manipulation for ubiquitous computing
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Access control to people location information
ACM Transactions on Information and System Security (TISSEC)
Human-centric network security management: a comprehensive helper
WMASH '06 Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots
MCSE: a multimedia context-based security engine
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Securing services in nomadic computing environments
Information and Software Technology
The Journal of Supercomputing
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Enforcing role based access control model with multimedia signatures
Journal of Systems Architecture: the EUROMICRO Journal
Ensuring spatio-temporal access control for real-world applications
Proceedings of the 14th ACM symposium on Access control models and technologies
Context-Based Constraints in Security: Motivations and First Approach
Electronic Notes in Theoretical Computer Science (ENTCS)
A generic framework for context-based distributed authorizations
CONTEXT'03 Proceedings of the 4th international and interdisciplinary conference on Modeling and using context
A spatio-temporal role-based access control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Context-aware security management system for pervasive computing environment
CONTEXT'07 Proceedings of the 6th international and interdisciplinary conference on Modeling and using context
Context sensitive adaptive authentication
EuroSSC'07 Proceedings of the 2nd European conference on Smart sensing and context
Evaluating confidence in context for context-aware security
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
A software framework for autonomic security in pervasive environments
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Architecture of context-aware workflow authorization management systems for workflow-based systems
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
A novel access control framework for secure pervasive computing
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
SaaS-model-based approach for mobile government security
International Journal of Mobile Communications
A location based security framework for authenticating mobile phones
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing
A dynamic security framework for ambient intelligent systems: a smart-home based eHealth application
Transactions on computational science X
Context-aware device self-configuration using self-organizing maps
Proceedings of the 2011 workshop on Organic computing
CAMPUS: context aware mobile platform for uniformed security
Proceedings of the 13th international conference on Ubiquitous computing
Trust establishment in emergency case
iTrust'06 Proceedings of the 4th international conference on Trust Management
Environmentally-aware security enforcement (EASE) for cooperative design and engineering
CDVE'05 Proceedings of the Second international conference on Cooperative Design, Visualization, and Engineering
A context-aware system for smart home applications
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A survey of security issue in multi-agent systems
Artificial Intelligence Review
LRBAC: a location-aware role-based access control model
ICISS'06 Proceedings of the Second international conference on Information Systems Security
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Architecture of context-aware integrated security management systems for smart home environment
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
Proceedings of the 18th ACM symposium on Access control models and technologies
Runtime adaptive multi-factor authentication for mobile devices
IBM Journal of Research and Development
Hi-index | 0.00 |
We describe an approach to building security servicesfor context-aware environments. Specifically, we focus onthe design of security services that incorporate the use ofsecurity-relevant "context" to provide flexible access controland policy enforcement. We previously presented a generalizedaccess control model that makes significant use ofcontextual information in policy definition. This documentprovides a concrete realization of such a model by presentinga system-level service architecture, as well as early implementationexperience with the framework. Through ourcontext-aware security services, our system architecture offersenhanced authentication services, more flexible accesscontrol and a security subsystem that can adapt itself basedon current conditions in the environment. We discuss ourarchitecture and implementation and show how it can beused to secure several sample applications.