Personalizing context-aware access control on mobile platforms

dc.contributor.authorDas, Prajit Kumar
dc.contributor.authorJoshi, Anupam
dc.contributor.authorFinin, Tim
dc.date.accessioned2018-10-19T13:19:25Z
dc.date.available2018-10-19T13:19:25Z
dc.date.issued2017-12-14
dc.description3rd IEEE International Conference on Collaboration and Internet Computingen
dc.description.abstractContext-sensitive access control has been a research topic within mobile computing for more than a decade. Much of the work has focused on modeling context and representing policies. Choosing an appropriate policy for a user, however, remains a challenging goal. Creating usable mobile access control solutions have been researched from a users permission control perspective. We present a study carried out with subjects using their personal mobile devices that captures individualized policies through an iterative user feedback process. Policy precision, also referred to as "Violation Metric" (VM), was used to decide when all necessary policies had been captured. The feedback process used a hierarchical context ontology to represent user-context and gathered contextual-situations in which a policy would be applicable. The study also investigated the feasibility of using the VM measure to determine completion of the capture process for the users personalized access control policies, that handles their mobile privacy and security needs. Using an appropriate predefined policy is shown to have lesser user impact when trying to personalize access control policies for users.en
dc.description.sponsorshipSupport for this work was provided by NSF grants 0910838 and 1228198.en
dc.description.urihttps://ieeexplore.ieee.org/document/8181486en
dc.format.extent10 pagesen
dc.genreconference paper pre-print and presentation slidesen
dc.identifierdoi:10.13016/M2B56D81S
dc.identifier.citationPrajit Kumar Das, Anupam Joshi, Tim Finin, Personalizing context-aware access control on mobile platforms, 3rd IEEE International Conference on Collaboration and Internet Computing, 2017, DOI: 10.1109/CIC.2017.00025en
dc.identifier.uri10.1109/CIC.2017.00025
dc.identifier.urihttp://hdl.handle.net/11603/11603
dc.language.isoenen
dc.publisherIEEEen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2017 IEEE
dc.subjectmobile access controlen
dc.subjectpersonalized access controlen
dc.subjectuser security and privacyen
dc.subjectContext modelingen
dc.subjectontologies (artificial intelligence)en
dc.subjectusers permission control perspectiveen
dc.subjecthierarchical context ontologyen
dc.subjectcontext-sensitive access controlen
dc.subjectUMBC Ebiquity Research Groupen
dc.subjectcontext-aware access controlen
dc.titlePersonalizing context-aware access control on mobile platformsen
dc.typeTexten

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
855.pdf
Size:
490.45 KB
Format:
Adobe Portable Document Format
Description:
Loading...
Thumbnail Image
Name:
859.ppt
Size:
8.88 MB
Format:
Microsoft Powerpoint
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.68 KB
Format:
Item-specific license agreed upon to submission
Description: