Context sensitive access control

  • Authors:
  • R. J. Hulsebosch;A. H. Salden;M. S. Bargh;P. W. G. Ebben;J. Reitsma

  • Affiliations:
  • Telematica Instituut, The Netherlands;Telematica Instituut, The Netherlands;Telematica Instituut, The Netherlands;Telematica Instituut, The Netherlands;Telematica Instituut, The Netherlands

  • Venue:
  • Proceedings of the tenth ACM symposium on Access control models and technologies
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We investigate the practical feasibility of using context information for controlling access to services. Based solely on situational context, we show that users can be transparently provided anonymous access to services and that service providers can still impose various security levels. Thereto, we propose context-sensitive verification methods that allow checking the user's claimed authenticity in various ways and to various degrees. More precisely, conventional information management approaches are used to compare historic contextual (service usage) data of an individual user or group. The result is a relatively strong, less intrusive and more flexible access control process that mimics our natural way of authentication and authorization in the physical world.