Concepedia

Publication | Closed Access

Securing context-aware applications using environment roles

429

Citations

18

References

2001

Year

TLDR

Future ubiquitous computing infrastructures will assist people at home and work, but the applications will handle private data and access diverse resources, making security challenging because access decisions depend on contextual factors. We demonstrate that roles can capture the security‑relevant context of the environment in which access requests are made, enabling a uniform access control framework for context‑aware applications. We present a security architecture that supports policies leveraging environment roles to control resource access.

Abstract

In the future, a largely invisible and ubiquitous computing infrastructure will assist people with a variety of activities in the home and at work. The applications that will be deployed in such systems will create and manipulate private information and will provide access to a variety of other resources. Securing such applications is challenging for a number of reasons. Unlike traditional systems where access control has been explored, access decisions may depend on the context in which requests are made. We show how the well-developed notion of roles can be used to capture security-relevant context of the environment in which access requests are made. By introducing environment roles, we create a uniform access control framework that can be used to secure context-aware applications. We also present a security architecture that supports security policies that make use of environment roles to control access to resources.

References

YearCitations

Page 1