Situational access control in the internet of things

R Schuster, V Shmatikov, E Tromer - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Access control in the Internet of Things (IoT) often depends on a situation---for example," the
user is at home''---that can only be tracked using multiple devices. In contrast to the (well …

Supporting location-based conditions in access control policies

CA Ardagna, M Cremonini, E Damiani… - Proceedings of the …, 2006 - dl.acm.org
Location-based Access Control (LBAC) techniques allow taking users' physical location into
account when determining their access privileges. In this paper, we present an approach to …

LoT-RBAC: A Location and Time-Based RBAC Model

SM Chandran, JBD Joshi - … –WISE 2005: 6th International Conference on …, 2005 - Springer
Recent growth in location-based mobile services has introduced a significant need for
location and time-based access control to resources. High mobility of the users and services …

Context-based access control systems for mobile devices

B Shebaro, O Oluwatimi… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Mobile Android applications often have access to sensitive data and resources on the user
device. Misuse of this data by malicious applications may result in privacy breaches and …

Modeling contextual security policies

F Cuppens, N Cuppens-Boulahia - International Journal of Information …, 2008 - Springer
As computer infrastructures become more complex, security models must provide means to
handle more flexible and dynamic requirements. In the Organization Based Access Control …

[PDF][PDF] Context-aware dynamic access control for pervasive applications

G Zhang, M Parashar - Proceedings of the Communication …, 2004 - coewww.rutgers.edu
As computing technology becomes more pervasive and mobile services are deployed,
applications will need flexible access control mechanisms. Unlike traditional approaches for …

Toward a usage-based security framework for collaborative computing systems

X Zhang, M Nakae, MJ Covington… - ACM Transactions on …, 2008 - dl.acm.org
Collaborative systems such as Grids provide efficient and scalable access to distributed
computing capabilities and enable seamless resource sharing between users and platforms …

A framework and risk assessment approaches for risk-based access control in the cloud

DR dos Santos, R Marinho, GR Schmitt… - Journal of Network and …, 2016 - Elsevier
Cloud computing is advantageous for customers and service providers. However, it has
specific security requirements that are not captured by traditional access control models, eg …

User definable policy for graduated authentication based on the partial orderings of principals

ES Chan, R Ahad, RJ Hall, TM Olkin… - US Patent …, 2014 - Google Patents
2008-02-12 Assigned to ORACLE INTERNATIONAL CORPORATION reassignment
ORACLE INTERNATIONAL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST …

Automate: Enabling autonomic applications on the grid

M Parashar, H Liu, Z Li, V Matossian, C Schmidt… - Cluster …, 2006 - Springer
The increasing complexity, heterogeneity, and dynamism of emerging pervasive Grid
environments and applications has necessitated the development of autonomic self …