Personalizing context-aware access control on mobile platforms

dc.contributor.authorDas, Prajit Kumar
dc.contributor.authorJoshi, Anupam
dc.contributor.authorFinin, Tim
dc.date.accessioned2018-10-19T13:19:25Z
dc.date.available2018-10-19T13:19:25Z
dc.date.issued2017-12-14
dc.description3rd IEEE International Conference on Collaboration and Internet Computingen_US
dc.description.abstractContext-sensitive access control has been a research topic within mobile computing for more than a decade. Much of the work has focused on modeling context and representing policies. Choosing an appropriate policy for a user, however, remains a challenging goal. Creating usable mobile access control solutions have been researched from a users permission control perspective. We present a study carried out with subjects using their personal mobile devices that captures individualized policies through an iterative user feedback process. Policy precision, also referred to as "Violation Metric" (VM), was used to decide when all necessary policies had been captured. The feedback process used a hierarchical context ontology to represent user-context and gathered contextual-situations in which a policy would be applicable. The study also investigated the feasibility of using the VM measure to determine completion of the capture process for the users personalized access control policies, that handles their mobile privacy and security needs. Using an appropriate predefined policy is shown to have lesser user impact when trying to personalize access control policies for users.en_US
dc.description.sponsorshipSupport for this work was provided by NSF grants 0910838 and 1228198.en_US
dc.description.urihttps://ieeexplore.ieee.org/document/8181486en_US
dc.format.extent10 pagesen_US
dc.genreconference paper pre-print and presentation slidesen_US
dc.identifierdoi:10.13016/M2B56D81S
dc.identifier.citationPrajit Kumar Das, Anupam Joshi, Tim Finin, Personalizing context-aware access control on mobile platforms, 3rd IEEE International Conference on Collaboration and Internet Computing, 2017, DOI: 10.1109/CIC.2017.00025en_US
dc.identifier.uri10.1109/CIC.2017.00025
dc.identifier.urihttp://hdl.handle.net/11603/11603
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2017 IEEE
dc.subjectmobile access controlen_US
dc.subjectpersonalized access controlen_US
dc.subjectuser security and privacyen_US
dc.subjectContext modelingen_US
dc.subjectontologies (artificial intelligence)en_US
dc.subjectusers permission control perspectiveen_US
dc.subjecthierarchical context ontologyen_US
dc.subjectcontext-sensitive access controlen_US
dc.subjectUMBC Ebiquity Research Groupen_US
dc.subjectcontext-aware access controlen_US
dc.titlePersonalizing context-aware access control on mobile platformsen_US
dc.typeTexten_US

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
855.pdf
Size:
490.45 KB
Format:
Adobe Portable Document Format
Description:
Loading...
Thumbnail Image
Name:
859.ppt
Size:
8.88 MB
Format:
Microsoft Powerpoint
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.68 KB
Format:
Item-specific license agreed upon to submission
Description: