Situational access control in the internet of things
Access control in the Internet of Things (IoT) often depends on a situation---for example," the
user is at home''---that can only be tracked using multiple devices. In contrast to the (well …
user is at home''---that can only be tracked using multiple devices. In contrast to the (well …
Supporting location-based conditions in access control policies
Location-based Access Control (LBAC) techniques allow taking users' physical location into
account when determining their access privileges. In this paper, we present an approach to …
account when determining their access privileges. In this paper, we present an approach to …
LoT-RBAC: A Location and Time-Based RBAC Model
SM Chandran, JBD Joshi - … –WISE 2005: 6th International Conference on …, 2005 - Springer
Recent growth in location-based mobile services has introduced a significant need for
location and time-based access control to resources. High mobility of the users and services …
location and time-based access control to resources. High mobility of the users and services …
Context-based access control systems for mobile devices
B Shebaro, O Oluwatimi… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Mobile Android applications often have access to sensitive data and resources on the user
device. Misuse of this data by malicious applications may result in privacy breaches and …
device. Misuse of this data by malicious applications may result in privacy breaches and …
Modeling contextual security policies
F Cuppens, N Cuppens-Boulahia - International Journal of Information …, 2008 - Springer
As computer infrastructures become more complex, security models must provide means to
handle more flexible and dynamic requirements. In the Organization Based Access Control …
handle more flexible and dynamic requirements. In the Organization Based Access Control …
[PDF][PDF] Context-aware dynamic access control for pervasive applications
G Zhang, M Parashar - Proceedings of the Communication …, 2004 - coewww.rutgers.edu
As computing technology becomes more pervasive and mobile services are deployed,
applications will need flexible access control mechanisms. Unlike traditional approaches for …
applications will need flexible access control mechanisms. Unlike traditional approaches for …
Toward a usage-based security framework for collaborative computing systems
X Zhang, M Nakae, MJ Covington… - ACM Transactions on …, 2008 - dl.acm.org
Collaborative systems such as Grids provide efficient and scalable access to distributed
computing capabilities and enable seamless resource sharing between users and platforms …
computing capabilities and enable seamless resource sharing between users and platforms …
A framework and risk assessment approaches for risk-based access control in the cloud
DR dos Santos, R Marinho, GR Schmitt… - Journal of Network and …, 2016 - Elsevier
Cloud computing is advantageous for customers and service providers. However, it has
specific security requirements that are not captured by traditional access control models, eg …
specific security requirements that are not captured by traditional access control models, eg …
User definable policy for graduated authentication based on the partial orderings of principals
ES Chan, R Ahad, RJ Hall, TM Olkin… - US Patent …, 2014 - Google Patents
2008-02-12 Assigned to ORACLE INTERNATIONAL CORPORATION reassignment
ORACLE INTERNATIONAL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST …
ORACLE INTERNATIONAL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST …
Automate: Enabling autonomic applications on the grid
M Parashar, H Liu, Z Li, V Matossian, C Schmidt… - Cluster …, 2006 - Springer
The increasing complexity, heterogeneity, and dynamism of emerging pervasive Grid
environments and applications has necessitated the development of autonomic self …
environments and applications has necessitated the development of autonomic self …