Secure Contexts: Context-Dependent, Dynamic, and Adaptive Security and Privacy
نویسنده
چکیده
All our interactions have some contextual information associated with them. Be it meeting with a co-worker in the hallway to discuss a project, or a team meeting in a meeting room, or a doctor and her staff meeting a patient, contexts are defined by attributes of all entities involved in the interaction. We consider the dynamic nature of contexts and propose a dynamic object model of context, and consider its application in access control. We envision that this model can be generalized to address context-dependent security and privacy needs in several application scenarios.
منابع مشابه
A context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملAdaptive and composite privacy and security mechanism for IoT communication
With billions of connected devices expected in near future, the number and nature of IoT networks and their various interactions is certain to grow rapidly. As a result, the need for security and privacy of IoT networks during such interactions is a subject of major interest. Security & privacy related aspects need to take into consideration the context and purpose of such diverse types of inte...
متن کاملConsistent Adaptive Two-Party Computations
Secure protocols for complicated tasks are usually constructed in two phases. Initially, one designs a protocol that is secure in a semihonest model. Second, zero-knowledge correctness proofs are added to assure correctness and privacy against malicious adversaries. Often the corresponding communication and computational overhead makes this approach intractable in practice. Therefore, we define...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کامل