Authors
Michael J Covington, Wende Long, Srividhya Srinivasan, Anind K Dey, Mustaque Ahamad, Gregory D Abowd
Publication date
2001/5/1
Conference
Proceedings of the sixth ACM symposium on Access control models and technologies
Pages
10-20
Publisher
ACM
Description
In the future, a largely invisible and ubiquitous computing infrastructure will assist people with a variety of activities in the home and at work. The applications that will be deployed in such systems will create and manipulate private information and will provide access to a variety of other resources. Securing such applications is challenging for a number of reasons. Unlike traditional systems where access control has been explored, access decisions may depend on the context in which requests are made. We show how the well-developed notion of roles can be used to capture security-relevant context of the environment in which access requests are made. By introducing environment roles, we create a uniform access control framework that can be used to secure context-aware applications. We also present a security architecture that supports security policies that make use of environment roles to control access to …
Total citations
2002200320042005200620072008200920102011201220132014201520162017201820192020202120222023181831435349544648374428322722181714141245
Scholar articles
MJ Covington, W Long, S Srinivasan, AK Dev… - Proceedings of the sixth ACM symposium on Access …, 2001