IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second
DOI: 10.1109/percomw.2004.1276919
|View full text |Cite
|
Sign up to set email alerts
|

Towards context-aware security: an authorization architecture for intranet environments

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…A generic context-aware RBAC model and a policy specification language for defining contextaware RBAC security polices were proposed in [7], [10]. Similar to the RBAC model in [7], context-aware RBAC approaches were implemented in [1], [11] that can detect changes in context and adjust access control according to the changes. An RBAC approach for enforcing a security policy to security controls or devices that lack in functionalities to be aware of context was proposed in [12] by leveraging the policy decision and enforcement points.…”
Section: Related Workmentioning
confidence: 99%
“…A generic context-aware RBAC model and a policy specification language for defining contextaware RBAC security polices were proposed in [7], [10]. Similar to the RBAC model in [7], context-aware RBAC approaches were implemented in [1], [11] that can detect changes in context and adjust access control according to the changes. An RBAC approach for enforcing a security policy to security controls or devices that lack in functionalities to be aware of context was proposed in [12] by leveraging the policy decision and enforcement points.…”
Section: Related Workmentioning
confidence: 99%
“…However, some research has pursued another directionenhancing existing security infrastructures with concepts of context-awareness [30]. A common approach here is extending an existing role-based access control with a dynamic layer, which reassigns roles upon context changes [22], or enabling the access control system with the ability to handle context directly [17].…”
Section: Related Workmentioning
confidence: 99%
“…While Covington extends the general RBAC model to create context-awareness mainly on the permissions to roles assignment, Wullems [12] defines context-awareness on the users to roles assignment and authentication of users to the system. This approach is designed to augment existing security protocols and therefore he focuses on the implementation of the architecture.…”
Section: Related Workmentioning
confidence: 99%