The 2007 International Conference on Intelligent Pervasive Computing (IPC 2007) 2007
DOI: 10.1109/ipc.2007.28
|View full text |Cite
|
Sign up to set email alerts
|

A Context-Aware Access Control Model for Pervasive Computing Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2009
2009
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 6 publications
0
6
0
1
Order By: Relevance
“…Context has been applied to different areas, such as the Internet of Things [18], vehicles [19], mobile computing [20], and healthcare social networks [21]. Furthermore, using context to improve the security of different applications has become an important task for researchers [22,23,[25][26][27][28][29][30][31][32].…”
Section: Contextmentioning
confidence: 99%
See 1 more Smart Citation
“…Context has been applied to different areas, such as the Internet of Things [18], vehicles [19], mobile computing [20], and healthcare social networks [21]. Furthermore, using context to improve the security of different applications has become an important task for researchers [22,23,[25][26][27][28][29][30][31][32].…”
Section: Contextmentioning
confidence: 99%
“…At the beginning of a session, the model dynamically assigns roles to a user considering only long-term contexts. However, during the session, an active permission set for the assigned roles is determined according to the short-term context conditions [26]. Rathod et al, "introduced a semantically rich context-sensitive access control system for OpenStack by incorporating the current context attributes of a user (such as location and time).…”
Section: Contextmentioning
confidence: 99%
“…In addition, there are many studies (Emami and Zokaei 2005;Fan et al, 2004;Fundulaki and Marx, 2004) using different approaches to solve data access control. Some authors use four tuples Schema Role Access Control Policy (SRACP) (Li et al, 2011), but this kind of expression hasn't been adopted extensively.…”
Section: Xml Access Control Protocolmentioning
confidence: 99%
“…In fact, context and access control are essentially interdependent. In context-based access control research, an access permission technique that uses context is being intensely investigated because of the ease with which various dynamic access permissions can be assigned in accordance with the various changes in context [21][22][23][24][25][26][27][28][29].…”
Section: International Journal Of Distributed Sensor Networkmentioning
confidence: 99%