Skip to main content

A Generic Framework for Context-Based Distributed Authorizations

  • Conference paper
  • First Online:
Modeling and Using Context (CONTEXT 2003)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2680))

Abstract

In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and off for denying access. This access policy is principally based on the user’s identity and is static over time. As applications become more pervasive, security policies must become more flexible in order to respond to these highly dynamic computing environments. That is, security infrastructures will need to be sensitive to context. In order to meet these requirements, we propose a conceptual model for context-based authorizations tuning. This model offers a fine-grained control over access on protected resources, based on a set of user’s and environment state and information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brézillon, P., Pomerol, J-Ch.: Contextual Knowledge Sharing and Cooperation in Intelligent Assistant Systems. Le Travail Humain 62(3), PUF, Paris, (1999) 223–246

    Google Scholar 

  2. Balfanz, D., Dean, D., Spreitzer, M.: A Security Infrastructure for Distributed Java Applications. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, Oakland, California, (2000) 15–26

    Google Scholar 

  3. Wack, J.: Guidelines on Firewalls and Firewall Policy. Computer Security Division. Information Technology Laboratory. National Institute of Standards and Technology

    Google Scholar 

  4. Covington, M.J., Ahamad, M., Srinivasan, S.: A Security Architecture for Context-Aware Applications. Technical Report GIT-CC-01-12, College of Computing, Georgia Institute of Technology, May 2001

    Google Scholar 

  5. Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A Context-Aware Security Architecture for Emerging Applications. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada, USA, December 2002

    Google Scholar 

  6. Covington, M.J., Long, W., Srinivasan, S., Dey, D., Ahamad, M., Abowd., A.: Securing Context-Aware Applications Using Environment Roles. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT’ 01), Chantilly, Virginia, USA, May 2001

    Google Scholar 

  7. Masone, C.: Role Definition Language (RDL): A Language to Describe Context-Aware Roles. Dartmouth College, Computer Science. Hanover, NH. TR2002-426. May 2002

    Google Scholar 

  8. Shankar, N., Balfanz, D.: Enabling Secure Ad-hoc Communication Using Context-Aware Security Services. Extended Abstract. In Proceedings of UBICOMP2002-Workshop on Security in Ubiquitous Computing

    Google Scholar 

  9. Osbakk, P., Ryan, N.: Context Privacy, CC/PP, and P3P. In Proceedings of UBICOMP2002-Workshop on Security in Ubiquitous Computing

    Google Scholar 

  10. Schilit, B.N and Theimer, M.M.: Disseminating Active Map Information to Mobile Hosts. IEEE Network, 8(5): (1994) 22–32

    Article  Google Scholar 

  11. Dey, A.K.: Understanding and Using Context. Personal Ubi Comp 5 (2001) 1, 4–7

    Article  Google Scholar 

  12. Brézillon, P.: Using Context for Supporting Users Efficiently. Proceedings of the 36th Hawaii International Conference on Systems Sciences, HICSS-36, Track “Emerging Technologies”, R.H. Sprague (Ed.), Los Alamitos: IEEE, (2003)

    Google Scholar 

  13. Georgiadis C., Mavridis I., Pangalos G., Thomas, R.: Flexible Team-based Access Control Using Contexts. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001) ACM SIGSAC, Chantilly, VA, U.S.A, May 2001

    Google Scholar 

  14. Ferraiolo, D.F. and Kuhn, D.R.: Role Based Access Control. In Proceedings of the 15th National Computer Security Conference (1992)

    Google Scholar 

  15. Sandhu R. S., Coyne E. J., Feinstein H. L., and Youman C. E.: Role-Based Access Control Models. IEEE Computer, Volume 29, Number 2, February 1996, 38–47

    Google Scholar 

  16. Clancey, W. J.: The Epistimology of a Rule-Based Expert System: A Framework for Explanation. Artificial Intelligence Journal, 20(3): (1983) 197–204

    Article  MathSciNet  Google Scholar 

  17. Clancey, W. J.: Notes on “Epistimology of a Rule-Based Expert system”. Artificial Intelligence Journal, 59: (1993) 197–204

    Article  Google Scholar 

  18. Kokinov, B.: A Dynamic Approach to Context Modeling. Proceedings of the IJCAI-95 Workshop on Modeling Context in Knowledge Representation and Reasoning. LAFORIA 95/11, (1995)

    Google Scholar 

  19. Bouquet, P., Serafini, L., Brezillon, P., Benerecetti, M., Castellani, F. (eds.): Modelling and Using Context. In Proceedings of the 2nd International and Interdisciplinary Conference, CONTEXT99, Lecture Notes in Artificial Intelligence, Vol. 1688, Springer Verlag, (1999)

    Google Scholar 

  20. Henricksen, K., Indulska, J., Rakotonirainy, A.: Modeling Context Information in Pervasive Computing Systems. In Proceedings of the 1st International Conference, Pervasive 2002-Zurich August 2002, Lecture Notes in Computer Science, Vol. 2414, Springer Verlag, (2002) 167–180

    Google Scholar 

  21. Hong, J.I.: The Context Fabric: An Infrastructure for Context-Aware Computing. Extended Abstract. Conference on Human Factors and Computing Systems, (2002) 554–555

    Google Scholar 

  22. White, J.E.: Mobile Agents. In I. Bradshaw and M. Jeffrey, editors, Software Agents. MIT Press and American Association for Artificial Intelligence, (1997)

    Google Scholar 

  23. Brézillon, P., Pasquier, L., Pomerol J-Ch.: Reasoning with contextual graphs. European Journal of Operational Research, 136(2): (2002) 290–298

    Article  MATH  Google Scholar 

  24. Brézillon, P., Cavalcanti, M., Naveiro, R., Pomerol J-Ch.: SART: An intelligent assistant for subway control. Pesquisa Operacional, Brazilian Operations Research Society, 20(2): (2002) 247–268

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mostéfaoui, G.K., Brézillon, P. (2003). A Generic Framework for Context-Based Distributed Authorizations. In: Blackburn, P., Ghidini, C., Turner, R.M., Giunchiglia, F. (eds) Modeling and Using Context. CONTEXT 2003. Lecture Notes in Computer Science(), vol 2680. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44958-2_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-44958-2_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40380-7

  • Online ISBN: 978-3-540-44958-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics