Device-Enabled Authorization in the Grey-System
نویسندگان
چکیده
We describe the design of Grey, a set of software extensions that convert an off-the-shelf smartphone-class device into a tool by which its owner exercises and delegates her authority to both physical and virtual resources. We focus on the software components and user interfaces of Grey, highlighting the features of each. We also discuss an initial case study for Grey, in which we are equipping over 65 doors on two floors of office space for access control using Grey-enabled devices, for a population of roughly 150 persons. Further details of Grey, and this and other applications, can be found in a companion technical report.
منابع مشابه
Access control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملEstimation and Prediction of Residential Building Energy Consumption in Rural Areas of Chongqing
Energy simulation is a vital part of energy policy of a country, especially for a developing country like China where energy consumption is growing very rapidly. The present study has been conducted to simulate the total primary energy consumption in residential sector in rural areas in Chongqing by using macro and micro drivers including population size, number of households, persons per house...
متن کاملThe mechanism of Umayyad authorization in the beginning of Islam with emphasis on the role of the four geniuses
The transformation of the Islamic caliphate to the Umayyad dynasty took place in a short time after the death of Prophet Mohammad. This transformation became the source of many questions and reflections, especially since those who led such a change were Islam’s antagonists in the early years of prophecy and the rise of Islamic rule. Although, the role of the deep-rooted tradition of tribalism a...
متن کاملAn Authorization Framework for Database Systems
Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...
متن کامل