Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies 2005
DOI: 10.1145/1063979.1064000
|View full text |Cite
|
Sign up to set email alerts
|

Context sensitive access control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
84
0
2

Year Published

2006
2006
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 102 publications
(88 citation statements)
references
References 12 publications
0
84
0
2
Order By: Relevance
“…Meta-policies prescribe the relationship between policies: after Officer X has been out of contact for over 30 minutes, any access that was previously possible is now denied; once Professor Y has accessed 10 images, she can access no more of them; when the network capacity increases, Dr Z can access data to his heart's content. 3 Thus, these meta-policies are necessarily written at a higher level of abstraction than policies-and, as such, are intended to be closer to the level at which requirements might be captured or guidelines might be stated. Of course, providing a system with the functionality to adapt access control policies automatically means that the need for assurance that the correct policy is in place necessarily increases: ensuring that certain fundamental properties hold in every potential state, for example, is essential-we would not want our protection mechanism to evolve into a state that provided little protection, for example.…”
Section: Evolving Access Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…Meta-policies prescribe the relationship between policies: after Officer X has been out of contact for over 30 minutes, any access that was previously possible is now denied; once Professor Y has accessed 10 images, she can access no more of them; when the network capacity increases, Dr Z can access data to his heart's content. 3 Thus, these meta-policies are necessarily written at a higher level of abstraction than policies-and, as such, are intended to be closer to the level at which requirements might be captured or guidelines might be stated. Of course, providing a system with the functionality to adapt access control policies automatically means that the need for assurance that the correct policy is in place necessarily increases: ensuring that certain fundamental properties hold in every potential state, for example, is essential-we would not want our protection mechanism to evolve into a state that provided little protection, for example.…”
Section: Evolving Access Controlmentioning
confidence: 99%
“…Our concern in this paper is the construction of access control policies that rely on context to inform decisions. (Arguments as to the potential benefits of context-sensitive access control have been made by, for example, [1], [2], and [3].) Specifically, our concern is what might be termed evolving access controlwhereby access control decisions are made on the basis of state.…”
Section: Introductionmentioning
confidence: 99%
“…Date and time are obviously considered as a part of the environment. In some cases [7,10], location and speed can be considered as a part of the system infrastructure because sensors are part of the security system's domain, and thus can be easily verified. Our research has proved that there is no project that uses dynamic information for authorization which is not captured inside the domain of the security system, like information from users devices or sensors available inside the context of the user.…”
Section: Synthesismentioning
confidence: 99%
“…Many authors have also proposed models for access control policies that include rules about location or other context information [24][25][26][27][28][29][30][31][32][33][34], and both of most prominent languages used for writing digital rights management licences -the Extensible Rights Markup Language ("XrML") [35] and the Open Digital Rights Language [36] -support clauses that constrain the use of a file to a particular location.…”
Section: Related Workmentioning
confidence: 99%