Towards Shrink-Wrapped Security: Practically Incorporating Context Into Security Services

نویسندگان

  • Gleneesha Johnson
  • Paulo Shakarian
  • Neha Gupta
  • Ashok K. Agrawala
چکیده

The mobile workforce is rapidly increasing, and technological advances make it feasible for these workers to have ubiquitous access to a variety of resources with various protection requirements. The dynamic computing environment of these workers mandates a security paradigm in which security is tightly coupled with a user’s current situation. We have proposed a security paradigm to achieve this, called Shrink-Wrapped Security, in which security is constantly adapting to a user’s current situation, and a comprehensive amount of security-relevant context is used to characterize a user’s situation. We present an approach that uses generalized annotated programs (GAPs) to practically incorporate such context into security services, with a focus on access control. This allows us to represent context in a principled manner; consistently make security-related decisions; easily make temporary, ad-hoc changes to a security policy; and give a user feedback when access is denied so that she can make the appropriate adjustments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Incorporating Wind Power Generation And Demand Response into Security-Constrained Unit Commitment

Wind generation with an uncertain nature poses many challenges in grid integration and secure operation of power system. One of these operation problems is the unit commitment. Demand Response (DR) can be defined as the changes in electric usage by end-use customers from their normal consumption patterns in response to the changes in the price of electricity over time. Further, DR can be also d...

متن کامل

Reference Model Services

A Protocol Reference Model is an abstraction of the communication subsystem of a system. Thus, it is appropriate to focus on the protocol reference model when examining the issue of secure communications. In this paper, we discuss some issues in incorporating security services into a protocol reference model. The security services considered are authentication, con dentiality, integrity and acc...

متن کامل

Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach

In recent years, many security threats have entered into the organizations’ information and changed the  organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...

متن کامل

Towards a Reuse-oriented Security Engineering for Web-based Applications and Services-12-04-05-formatted

Security should be considered throughout a software development process to develop secure applications. This security engineering effort is restricted due to the complexity and diffusion of todays security knowledge. Approaches, such as misuse cases for threat specification and patterns for security functionality modeling, try to use and integrate security into software development, but their c...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011