International audienceDrawn from the lessons learned in an application for the subway company in Paris, we pointed out that operators used practices instead of the procedures developed by the company, practices appearing like contextualization of the procedures taking into account specificity of the task at hand and the current situation. This leads us to propose, first, a working definition of context at a theoretical level, and, second, its implementation in a software called Contextual Graphs. In this paper, we present the results of the complete loop, showing how the theoretical view is intertwined with the implemented one. Several results of the literature are discussed too. Beyond this internal coherence of our view on context, we consider knowledge acquisition, learning and explanation generation in our framework. Indeed, these tasks must be considered as integrated naturally with the task at hand of the user
International audienceDrawn from the lessons learned in an application for the subway company in Paris, we pointed out that operators used practices instead of the procedures developed by the company, practices appearing like contextualization of the procedures taking into account specificity of the task at hand and the current situation. This leads us to propose, first, a working definition of context at a theoretical level, and, second, its implementation in a software called Contextual Graphs. In this paper, we present the results of the complete loop, showing how the theoretical view is intertwined with the implemented one. Several results of the literature are discussed too. Beyond this internal coherence of our view on context, we consider knowledge acquisition, learning and explanation generation in our framework. Indeed, these tasks must be considered as integrated naturally with the task at hand of the user
Abstract. In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and off for denying access. This access policy is principally based on the user's identity and is static over time. As applications become more pervasive, security policies must become more flexible in order to respond to these highly dynamic computing environments. That is, security infrastructures will need to be sensitive to context. In order to meet these requirements, we propose a conceptual model for context-based authorizations tuning. This model offers a fine-grained control over access on protected resources, based on a set of user's and environment state and information.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.