Dynamic access control: preserving safety and trust for network defense operations
Proceedings of the eighth ACM symposium on Access control models and technologies
KNOW Why your access was denied: regulating feedback for usable security
Proceedings of the 11th ACM conference on Computer and communications security
GEO-RBAC: a spatially aware RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
Improving user-interface dependability through mitigation of human error
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Ubiquitous computing environments and its usage access control
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
ACM Transactions on Information and System Security (TISSEC)
Location constraints in digital rights management
Computer Communications
International Journal of Web and Grid Services
Data security in location-aware applications: an approach based on RBAC
International Journal of Information and Computer Security
Context-aware role-based access control in pervasive computing systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Access control management for ubiquitous computing
Future Generation Computer Systems
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Secure localised storage based on super-distributed RFID-tag infrastructures
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Ensuring spatio-temporal access control for real-world applications
Proceedings of the 14th ACM symposium on Access control models and technologies
A Trust-Based Access Control Model for Pervasive Computing Applications
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Secure spaces: protecting freedom of information access in public places
ICOST'07 Proceedings of the 5th international conference on Smart homes and health telematics
A spatio-temporal role-based access control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Context RBAC/MAC access control for ubiquitous environment
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Augmenting trust establishment in dynamic systems with social networks
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
New role-based access control in ubiquitous e-business environment
Journal of Intelligent Manufacturing
Security policies in distributed CSCW and workflow systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Access nets: modeling access to physical spaces
VMCAI'11 Proceedings of the 12th international conference on Verification, model checking, and abstract interpretation
CRePE: context-related policy enforcement for android
ISC'10 Proceedings of the 13th international conference on Information security
A service-centric approach to a parameterized RBAC service
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Security in depth through smart space cascades
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
A Generative Programming Framework for Context-Aware CSCW Applications
ACM Transactions on Software Engineering and Methodology (TOSEM)
Context-aware regulation of context-aware mobile services in pervasive computing environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Protecting user data in ubiquitous computing: towards trustworthy environments
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Supporting dynamically changing authorizations in pervasive communication systems
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
LRBAC: a location-aware role-based access control model
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Context-awareness: exploring the imperative shared context of security and ubiquitous computing
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services
Proceedings of the 18th ACM symposium on Access control models and technologies
CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
Active Spaces are physical spaces augmented with heterogeneouscomputing and communication devices along with supportingsoftware infrastructure. This integration facilitates collaborationbetween users, and promotes greater levels of interactionbetween users and devices. An Active Space can be configuredfor different types of applications at different times. We presentan access control system that automates the creation and enforcementof access control policies for different configurations of anActive Space. Our system explicitly recognizes different modes ofcooperation between groups of users, and the dependence betweenphysical and virtual aspects of security in Active Spaces.Our model provides support for both discretionary andmandatory access control policies, and uses role-based accesscontrol techniques for easy administration of users andpermissions. We dynamically assign permissions to user rolesbased on context information. With the help of an examplescenario, we show how we can create dynamic protectiondomains. This allows administrators and application developersthe ability to customize access control policies on a need-to-protectbasis. We also provide a semi-formal specification andanalysis of our model and show how we preserve safety propertiesin spite of dynamic changes to access control permissions. Wealso show how our model preserves the principle of least privilege,promotes separation of duty, and prevents rights-amplification.