With sensitive information about ourselves now distributed across personal devices, people need to make access control decisions for different contexts of use. However, despite advances in improving the usability of access control for both developers and users, we still lack insights about how the intentions behind policy decisions in different contexts of use are shaped. In this paper, we describe how context was incorporated into an access control framework using a study of how context influences access control decision making. We describe how the main recommendations arising from this study were used to build context into a policy editor for this access control framework
Due to the rapid advancement of communication technologies, the ability to support access control to...
E-Health systems logically demand a sufficiently fine-grained authorization policy for access contro...
Abstract—Following Mark Weiser’s vision of ubiquitous com-puting and calm technology, computer syste...
With sensitive information about ourselves now distributed across personal devices, people need to m...
With sensitive information about ourselves now distributed across personal devices, people need to m...
Context-aware systems acquire and integrate multi-faceted knowledge about their environments in orde...
Abstract. Context-aware systems acquire and integrate multi-faceted know-ledge about their environme...
With the increasing popularity of personal mobile devices like smartphones, more and more ordinary u...
In the present age, context-awareness is an important aspect of the dynamic environments and the dif...
The role-based access control (RBAC) has become the widely used access control system for providing ...
Users are burdened with the task of configuring access control policies on many dif- ferent applicat...
Abstract. The widespread diffusion of wireless-enabled portable de-vices creates novel opportunities...
Users commonly provide permissions to software applications running on their personal computing devi...
The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users ...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Due to the rapid advancement of communication technologies, the ability to support access control to...
E-Health systems logically demand a sufficiently fine-grained authorization policy for access contro...
Abstract—Following Mark Weiser’s vision of ubiquitous com-puting and calm technology, computer syste...
With sensitive information about ourselves now distributed across personal devices, people need to m...
With sensitive information about ourselves now distributed across personal devices, people need to m...
Context-aware systems acquire and integrate multi-faceted knowledge about their environments in orde...
Abstract. Context-aware systems acquire and integrate multi-faceted know-ledge about their environme...
With the increasing popularity of personal mobile devices like smartphones, more and more ordinary u...
In the present age, context-awareness is an important aspect of the dynamic environments and the dif...
The role-based access control (RBAC) has become the widely used access control system for providing ...
Users are burdened with the task of configuring access control policies on many dif- ferent applicat...
Abstract. The widespread diffusion of wireless-enabled portable de-vices creates novel opportunities...
Users commonly provide permissions to software applications running on their personal computing devi...
The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users ...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Due to the rapid advancement of communication technologies, the ability to support access control to...
E-Health systems logically demand a sufficiently fine-grained authorization policy for access contro...
Abstract—Following Mark Weiser’s vision of ubiquitous com-puting and calm technology, computer syste...