EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
The smart floor: a mechanism for natural user identification and tracking
CHI '00 Extended Abstracts on Human Factors in Computing Systems
Access Control and Trust in the Use of Widely Distributed Services
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Collaborative Context Recognition for Handheld Devices
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Context Authentication Using Constrained Channels
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Reasoning about Uncertain Contexts in Pervasive Computing Environments
IEEE Pervasive Computing
A Trust-based Context-Aware Access Control Model for Web-Services
ICWS '04 Proceedings of the IEEE International Conference on Web Services
A survey of recent advances in fuzzy logic in telecommunications networks and new challenges
IEEE Transactions on Fuzzy Systems
Integrating presence inference into trust management for ubiquitous systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Sharing digital rights with domain licensing
Proceedings of the 4th ACM international workshop on Contents protection and security
Inverting sensor networks and actuating the environment for spatio-temporal access control
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A Monte Carlo framework to evaluate context based security policies in pervasive mobile environments
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
Trust-enhanced Security in Location-based Adaptive Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
Location constraints in digital rights management
Computer Communications
A geotemporal role-based authorisation system
International Journal of Information and Computer Security
A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Context-sensitive authorization in interaction patterns
Mobility '09 Proceedings of the 6th International Conference on Mobile Technology, Application & Systems
A trusted decentralized access control framework for the client/server architecture
Journal of Network and Computer Applications
Security patterns for physical access control systems
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Context sensitive adaptive authentication
EuroSSC'07 Proceedings of the 2nd European conference on Smart sensing and context
Trust management model and architecture for context-aware service platforms
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Fine-grained access control for EPC information services
IOT'08 Proceedings of the 1st international conference on The internet of things
Enforcing spatial constraints for mobile RBAC systems
Proceedings of the 15th ACM symposium on Access control models and technologies
Adaptive security management model in the cloud computing environment
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment
Wireless Personal Communications: An International Journal
Benefits of Location-Based Access Control: A Literature Study
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
A study on context services model with location privacy
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Conformance checking of dynamic access control policies
ICFEM'11 Proceedings of the 13th international conference on Formal methods and software engineering
Scalability in a secure distributed proof system
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
A DRBAC model based on context for smart and secure services in intelligent ubiquitous home
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
A contextual attribute-based access control model
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Spatial context in role-based access control
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Situation-based policy enforcement
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
A pattern-driven framework for monitoring security and dependability
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Formalising security in ubiquitous and cloud scenarios
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Information Systems and e-Business Management
CASA: context-aware scalable authentication
Proceedings of the Ninth Symposium on Usable Privacy and Security
DR BACA: dynamic role based access control for Android
Proceedings of the 29th Annual Computer Security Applications Conference
Behavior-based access control for distributed healthcare systems
Journal of Computer Security
Hi-index | 0.00 |
We investigate the practical feasibility of using context information for controlling access to services. Based solely on situational context, we show that users can be transparently provided anonymous access to services and that service providers can still impose various security levels. Thereto, we propose context-sensitive verification methods that allow checking the user's claimed authenticity in various ways and to various degrees. More precisely, conventional information management approaches are used to compare historic contextual (service usage) data of an individual user or group. The result is a relatively strong, less intrusive and more flexible access control process that mimics our natural way of authentication and authorization in the physical world.