Proceedings of the 18th ACM Symposium on Access Control Models and Technologies 2013
DOI: 10.1145/2462410.2463208
|View full text |Cite
|
Sign up to set email alerts
|

A versatile access control implementation

Abstract: In this demonstration paper, we describe the implementation of a versatile access control prototype based on multimodal biometrics and graphical passwords that had been designed and developed aligned with the current mobile, multichannel, multiservice, and usability demanding world. The BYOD scenario had also been considered to address the challenges related to protect both corporate and personal information that exist in mobile devices with no more boundaries.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…For example, an attribute subject can resolve to a more complex meaning such as multiple agents who issue a request based on a majority vote. 2 Let us illustrate this with examples of policy and policy composition in FROST. The policy in Figure 1 consists of a sole rule that grants the access when its condition is true and returns undef otherwise.…”
Section: Frost Languagementioning
confidence: 99%
See 1 more Smart Citation
“…For example, an attribute subject can resolve to a more complex meaning such as multiple agents who issue a request based on a majority vote. 2 Let us illustrate this with examples of policy and policy composition in FROST. The policy in Figure 1 consists of a sole rule that grants the access when its condition is true and returns undef otherwise.…”
Section: Frost Languagementioning
confidence: 99%
“…Attestable trust anchors on clients can help with usage control of data across devices [48]. Combining reputation anchors with obligation handling [2] or with DLT mechanisms such as obligation chains [41] can make trust more resilient in open systems. Hardware isolation of the access-control functionality from the normal application layers, e.g.…”
Section: Safety Resiliency and Trustmentioning
confidence: 99%