In pervasive computing environments, changes in context may trigger changes in an individual’s access permissions. We contend that existing access control frameworks do not provide the fine-grained revocation needed to enforce these changing authorizations. In this paper, we present an authorization framework, in the context of the Gaia OS for active spaces, which integrates context with authorization and provides fine-grained control over the enforcement of dynamically changing permissions using cryptographic mechanisms. Our design, implemented in middleware using distributed objects, addresses the limitations of traditional authorization frameworks and the specific access control needs of pervasive computing environments. As part of our p...
With the emergence of new dynamic computing environments, the traditional identity based authorizati...
This paper summarises ongoing research and recent results on the development of flexible access cont...
As computing environments become both mobile and pervasive, the need for robust and flexible access ...
In pervasive computing environments, changes in context may trigger changes in an individual's acces...
Abstract. In pervasive computing environments, changes in context may trigger changes in an individu...
In pervasive computing environments, changes in context may trigger changes in an individual's...
Abstract — Pervasive computing environments have by definition three main inherent properties; extre...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Abstract. The explosive evolution of pervasive computing environments presents several new challenge...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
International audienceIn conventional security systems, protected resources such as documents, hardw...
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to ...
This paper describes the authorization system architecture for Pervasive Grid environment. It discus...
Security requirements in distributed software systems are inherently dynamic. In the case of authori...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
With the emergence of new dynamic computing environments, the traditional identity based authorizati...
This paper summarises ongoing research and recent results on the development of flexible access cont...
As computing environments become both mobile and pervasive, the need for robust and flexible access ...
In pervasive computing environments, changes in context may trigger changes in an individual's acces...
Abstract. In pervasive computing environments, changes in context may trigger changes in an individu...
In pervasive computing environments, changes in context may trigger changes in an individual's...
Abstract — Pervasive computing environments have by definition three main inherent properties; extre...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Abstract. The explosive evolution of pervasive computing environments presents several new challenge...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
International audienceIn conventional security systems, protected resources such as documents, hardw...
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to ...
This paper describes the authorization system architecture for Pervasive Grid environment. It discus...
Security requirements in distributed software systems are inherently dynamic. In the case of authori...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
With the emergence of new dynamic computing environments, the traditional identity based authorizati...
This paper summarises ongoing research and recent results on the development of flexible access cont...
As computing environments become both mobile and pervasive, the need for robust and flexible access ...