Context-aware access control - Making access control decisions based on context information

被引:0
|
作者
Lachmund, Sven [1 ]
Walter, Thomas
Bussard, Laurent
Gomez, Laurent
Olk, Eddy
机构
[1] DoCoMo Euro Lab, Secur Technol Lab, Munich, Germany
[2] European Microsoft Innovat Ctr, Secur & Privacy Team, Aachen, Germany
[3] Secur & Trust SAP Res, Sophia Antipolis, France
[4] TNO Informat & Commun Technol, Secur Grp, Delft, Netherlands
关键词
context-aware access control; authorization service; context information; trust evaluation; messagefilter;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In ubiquitous computing environments access control decisions have to be adaptable to changes of the situation or state of an entity, in order to properly adjust to these changes without the need of manual interaction. A solution to this challenge is context-aware access control, where the mentioned changes are influencing access control decisions. In this paper we present a security framework for mobile business applications that is capable of performing context-aware access control on message level. There are several components in the framework that together (1) ensure that security requirements defined in policies are enforced in the framework, (2) provide context information and apply plausibility checks to increase the confidence that context information represents the actual situation or state (context) of an entity, and (3) perform the access-control decisions based on a combination of classic access control schemes and context information. In addition, a scenario is described where the introduced features of the framework are applied.
引用
收藏
页码:484 / 491
页数:8
相关论文
共 50 条
  • [1] Context-aware access control - Making access control decisions based on context information
    Lachmund, Sven
    Walter, Thomas
    Bussard, Laurent
    Gomez, Laurent
    Olk, Eddy
    [J]. 2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 470 - +
  • [2] Context-aware provisional access control
    Masoumzadeh, Amir Reza
    Amini, Morteza
    Jalili, Rasool
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 132 - +
  • [3] Context-role based access control for context-aware application
    Park, Seon-Ho
    Han, Young-Ju
    Chung, Tai-Myoung
    [J]. HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 572 - 580
  • [4] Using sensor and location information for context-aware access control
    Gomez, L
    Moraru, L
    Simplot-Ryl, D
    Wrona, K
    [J]. EUROCON 2005: THE INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL, VOL 1 AND 2 , PROCEEDINGS, 2005, : 68 - 71
  • [5] The Application of the Context-Aware Access Control Model
    Zhang, Chao
    Jin, Zhengping
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 2670 - 2674
  • [6] Context-Aware Risk Attribute Access Control
    Li, Binyong
    Yang, Fan
    Zhang, Shaowei
    [J]. MATHEMATICS, 2024, 12 (16)
  • [7] Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment
    Zhang, Rui
    Giunchiglia, Fausto
    Crispo, Bruno
    Song, Lingyang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 5 - 17
  • [8] Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment
    Rui Zhang
    Fausto Giunchiglia
    Bruno Crispo
    Lingyang Song
    [J]. Wireless Personal Communications, 2010, 55 : 5 - 17
  • [9] A Policy Model and Framework for Context-Aware Access Control to Information Resources
    Kayes, A. S. M.
    Han, Jun
    Rahayu, Wenny
    Dillon, Tharam
    Islam, Md. Saiful
    Colman, Alan
    [J]. COMPUTER JOURNAL, 2019, 62 (05): : 670 - 705
  • [10] Metaphors and Context-Aware Information Access
    Coschurba, Peter
    Baumann, Joachim
    Kubach, Uwe
    Leonhardi, Alexander
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2001, 5 (01) : 16 - 19