{"title":"Modeling context-based security policies with contextual graphs","authors":"G. K. Mostéfaoui, P. Brézillon","doi":"10.1109/PERCOMW.2004.1276900","DOIUrl":null,"url":null,"abstract":"Security is top priority for pervasive applications, for which the number of reported incidents is in constant increase. Context-based security is an emerging approach. It aims at coping with the security problems resulting from the high heterogeneity and dynamicity of such environments. In this paper, we propose a new model for policies specification based on contextual graphs. It relies on a set of contextual information collected from the system and user's environments. This approach aims at providing a convenient way for modeling security requirements in complex systems.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"38","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PERCOMW.2004.1276900","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 38
Abstract
Security is top priority for pervasive applications, for which the number of reported incidents is in constant increase. Context-based security is an emerging approach. It aims at coping with the security problems resulting from the high heterogeneity and dynamicity of such environments. In this paper, we propose a new model for policies specification based on contextual graphs. It relies on a set of contextual information collected from the system and user's environments. This approach aims at providing a convenient way for modeling security requirements in complex systems.