Secure Contexts: Context-Dependent, Dynamic, and Adaptive Security and Privacy

نویسنده

  • Raghav V. Sampangi
چکیده

All our interactions have some contextual information associated with them. Be it meeting with a co-worker in the hallway to discuss a project, or a team meeting in a meeting room, or a doctor and her staff meeting a patient, contexts are defined by attributes of all entities involved in the interaction. We consider the dynamic nature of contexts and propose a dynamic object model of context, and consider its application in access control. We envision that this model can be generalized to address context-dependent security and privacy needs in several application scenarios.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Adaptive and composite privacy and security mechanism for IoT communication

With billions of connected devices expected in near future, the number and nature of IoT networks and their various interactions is certain to grow rapidly. As a result, the need for security and privacy of IoT networks during such interactions is a subject of major interest. Security & privacy related aspects need to take into consideration the context and purpose of such diverse types of inte...

متن کامل

Consistent Adaptive Two-Party Computations

Secure protocols for complicated tasks are usually constructed in two phases. Initially, one designs a protocol that is secure in a semihonest model. Second, zero-knowledge correctness proofs are added to assure correctness and privacy against malicious adversaries. Often the corresponding communication and computational overhead makes this approach intractable in practice. Therefore, we define...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016