In pervasive computing environments, changes in context may trigger changes in an individual's access permissions. We contend that existing access control frameworks do not provide the fine-grained revocation needed to enforce these changing authorizations. In this paper, we present an authorization framework, in the context of the Gaia OS for active spaces, which integrates context with authorization and provides fine-grained control over the enforcement of dynamically changing permissions using cryptographic mechanisms. Our design, implemented in middleware, addresses the limitations of traditional authorization frameworks and the specific access control needs of pervasive computing environments. As part of our proposed framework, we defi...
With the emergence of new dynamic computing environments, the traditional identity based authorizati...
AbstractOur society is increasingly moving towards richer forms of information exchange where mobili...
Our society is increasingly moving towards richer forms of information exchange where mobility of pr...
In pervasive computing environments, changes in context may trigger changes in an individual's...
Abstract. In pervasive computing environments, changes in context may trigger changes in an individu...
Abstract — Pervasive computing environments have by definition three main inherent properties; extre...
Abstract. The explosive evolution of pervasive computing environments presents several new challenge...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to ...
This paper describes the authorization system architecture for Pervasive Grid environment. It discus...
International audienceIn conventional security systems, protected resources such as documents, hardw...
As computing environments become both mobile and pervasive, the need for robust and flexible access ...
Security requirements in distributed software systems are inherently dynamic. In the case of authori...
With the emergence of new dynamic computing environments, the traditional identity based authorizati...
AbstractOur society is increasingly moving towards richer forms of information exchange where mobili...
Our society is increasingly moving towards richer forms of information exchange where mobility of pr...
In pervasive computing environments, changes in context may trigger changes in an individual's...
Abstract. In pervasive computing environments, changes in context may trigger changes in an individu...
Abstract — Pervasive computing environments have by definition three main inherent properties; extre...
Abstract. The explosive evolution of pervasive computing environments presents several new challenge...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to ...
This paper describes the authorization system architecture for Pervasive Grid environment. It discus...
International audienceIn conventional security systems, protected resources such as documents, hardw...
As computing environments become both mobile and pervasive, the need for robust and flexible access ...
Security requirements in distributed software systems are inherently dynamic. In the case of authori...
With the emergence of new dynamic computing environments, the traditional identity based authorizati...
AbstractOur society is increasingly moving towards richer forms of information exchange where mobili...
Our society is increasingly moving towards richer forms of information exchange where mobility of pr...