Design and implementation of a flexible RBAC-service in an object-oriented scripting language
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Improving the granularity of access control for Windows 2000
ACM Transactions on Information and System Security (TISSEC)
Modeling Context-Based Security Policies with Contextual Graphs
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Role-based access control in ambient and remote space
Proceedings of the ninth ACM symposium on Access control models and technologies
Using trust and risk in role-based access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
A composite rbac approach for large, complex organizations
Proceedings of the ninth ACM symposium on Access control models and technologies
Context sensitive access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Trust Enhanced Security for Mobile Agents
CEC '05 Proceedings of the Seventh IEEE International Conference on E-Commerce Technology
An Introduction to RFID Technology
IEEE Pervasive Computing
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources
Autonomous Agents and Multi-Agent Systems
The Web and Complex Adaptive Systems
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
A Simple Model and Infrastructure for Context-Aware Browsing of the World
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Managing Context Information in Mobile Devices
IEEE Pervasive Computing
Risk models for trust-based access Control(TBAC)
iTrust'05 Proceedings of the Third international conference on Trust Management
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Journal of Network and Computer Applications
Hi-index | 0.00 |
A pervasive mobile computing environment is typically composed of multiple fixed and mobile entities that interact autonomously with each other with very little central control. Many of these interactions may occur between entities that have not interacted with each other previously. Conventional security models are inadequate for regulating access to data and services, especially when the identities of a dynamic and growing community of entities are not known in advance. In order to cope with this drawback, entities may rely on context data to make security and trust decisions. However, risk is introduced in this process due to the variability and uncertainty of context information. Moreover, by the time the decisions are made, the context data may have already changed and, in which case, the security decisions could become invalid. In this paper, we propose a Monte Carlo based framework to evaluate context based security policies. In this framework, context data is modeled and risk in security decisions is measured.