Personalizing context-aware access control on mobile platforms
dc.contributor.author | Das, Prajit Kumar | |
dc.contributor.author | Joshi, Anupam | |
dc.contributor.author | Finin, Tim | |
dc.date.accessioned | 2018-10-19T13:19:25Z | |
dc.date.available | 2018-10-19T13:19:25Z | |
dc.date.issued | 2017-12-14 | |
dc.description | 3rd IEEE International Conference on Collaboration and Internet Computing | en_US |
dc.description.abstract | Context-sensitive access control has been a research topic within mobile computing for more than a decade. Much of the work has focused on modeling context and representing policies. Choosing an appropriate policy for a user, however, remains a challenging goal. Creating usable mobile access control solutions have been researched from a users permission control perspective. We present a study carried out with subjects using their personal mobile devices that captures individualized policies through an iterative user feedback process. Policy precision, also referred to as "Violation Metric" (VM), was used to decide when all necessary policies had been captured. The feedback process used a hierarchical context ontology to represent user-context and gathered contextual-situations in which a policy would be applicable. The study also investigated the feasibility of using the VM measure to determine completion of the capture process for the users personalized access control policies, that handles their mobile privacy and security needs. Using an appropriate predefined policy is shown to have lesser user impact when trying to personalize access control policies for users. | en_US |
dc.description.sponsorship | Support for this work was provided by NSF grants 0910838 and 1228198. | en_US |
dc.description.uri | https://ieeexplore.ieee.org/document/8181486 | en_US |
dc.format.extent | 10 pages | en_US |
dc.genre | conference paper pre-print and presentation slides | en_US |
dc.identifier | doi:10.13016/M2B56D81S | |
dc.identifier.citation | Prajit Kumar Das, Anupam Joshi, Tim Finin, Personalizing context-aware access control on mobile platforms, 3rd IEEE International Conference on Collaboration and Internet Computing, 2017, DOI: 10.1109/CIC.2017.00025 | en_US |
dc.identifier.uri | 10.1109/CIC.2017.00025 | |
dc.identifier.uri | http://hdl.handle.net/11603/11603 | |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | © 2017 IEEE | |
dc.subject | mobile access control | en_US |
dc.subject | personalized access control | en_US |
dc.subject | user security and privacy | en_US |
dc.subject | Context modeling | en_US |
dc.subject | ontologies (artificial intelligence) | en_US |
dc.subject | users permission control perspective | en_US |
dc.subject | hierarchical context ontology | en_US |
dc.subject | context-sensitive access control | en_US |
dc.subject | UMBC Ebiquity Research Group | en_US |
dc.subject | context-aware access control | en_US |
dc.title | Personalizing context-aware access control on mobile platforms | en_US |
dc.type | Text | en_US |
Files
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 1.68 KB
- Format:
- Item-specific license agreed upon to submission
- Description: