Capturing policies for fine-grained access control on mobile devices
dc.contributor.author | Das, Prajit Kumar | |
dc.contributor.author | Joshi, Anupam | |
dc.contributor.author | Finin, Tim | |
dc.date.accessioned | 2018-10-17T16:43:59Z | |
dc.date.available | 2018-10-17T16:43:59Z | |
dc.date.issued | 2016-11-01 | |
dc.description | 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016 | en_US |
dc.description.abstract | As of 2016, there are more mobile devices than humans on earth. Today, mobile devices are a critical part of our lives and often hold sensitive corporate and personal data. As a result, they are a lucrative target for attackers, and managing data privacy and security on mobile devices has become a vital issue. Existing access control mechanisms in most devices are restrictive and inadequate. They do not take into account the context of a device and its user when making decisions. In many cases, the access granted to a subject should change based on the context of a device. Such fine-grained, context-sensitive access control policies have to be personalized too. In this paper, we present a system i.e. Mithril that uses policies represented in Semantic Web technologies and captured using user feedback, to handle access control on mobile devices. We present an iterative feedback process to capture user specific policy. We also present a policy violation metric that allows us to decide when the capture process is complete. | en_US |
dc.description.sponsorship | Support for this work was provided by NSF grants 0910838 and 1228198. | |
dc.description.uri | https://ieeexplore.ieee.org/document/7809692 | en_US |
dc.format.extent | 10 pages | en_US |
dc.genre | conference paper pre-print | en_US |
dc.identifier | doi:10.13016/M2TB0XZ9M | |
dc.identifier.citation | Prajit Kumar Das, Anupam Joshi, Tim Finin, Capturing policies for fine-grained access control on mobile devices, 01 Nov 2016, DOI: 10.1109/CIC.2016.021 | en_US |
dc.identifier.uri | 10.1109/CIC.2016.021 | |
dc.identifier.uri | http://hdl.handle.net/11603/11580 | |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.relation.ispartof | UMBC Student Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | © 2016 IEEE | |
dc.subject | Context | en_US |
dc.subject | Androids | en_US |
dc.subject | Context modeling | en_US |
dc.subject | Access control | en_US |
dc.subject | Measurement | en_US |
dc.subject | mobile computing | en_US |
dc.subject | semantic Web | en_US |
dc.subject | data privacy | en_US |
dc.subject | MITHRIL | en_US |
dc.subject | policy violation metric | en_US |
dc.subject | UMBC Ebiquity Research Group | |
dc.title | Capturing policies for fine-grained access control on mobile devices | en_US |
dc.type | Text | en_US |