Yair Diaz-Tellez, E. Bodanese, F. El-Moussa, T. Dimitrakos
{"title":"基于智能设备上承载的数据和应用程序活动检测的安全执行上下文强制框架","authors":"Yair Diaz-Tellez, E. Bodanese, F. El-Moussa, T. Dimitrakos","doi":"10.1109/SocialCom.2013.95","DOIUrl":null,"url":null,"abstract":"A mechanism that takes into account the combination of security requirements from independent administrative entities over a set of interacting resources on a smart device requires the ability to provide some sort of execution context control. The proposed framework consists of an architecture and a policy model. The architecture detects different events and activities (i.e. user, system, applications) and based on them enforces applicable policies and constrains the execution context for a given set of resources. The policy model offers a method to dynamically create a secure execution context by combining different types of policies (e.g. access, usage, execution) issued by different entities on protected resources.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"117 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Secure Execution Context Enforcement Framework Based on Activity Detection on Data and Applications Hosted on Smart Devices\",\"authors\":\"Yair Diaz-Tellez, E. Bodanese, F. El-Moussa, T. Dimitrakos\",\"doi\":\"10.1109/SocialCom.2013.95\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A mechanism that takes into account the combination of security requirements from independent administrative entities over a set of interacting resources on a smart device requires the ability to provide some sort of execution context control. The proposed framework consists of an architecture and a policy model. The architecture detects different events and activities (i.e. user, system, applications) and based on them enforces applicable policies and constrains the execution context for a given set of resources. The policy model offers a method to dynamically create a secure execution context by combining different types of policies (e.g. access, usage, execution) issued by different entities on protected resources.\",\"PeriodicalId\":129308,\"journal\":{\"name\":\"2013 International Conference on Social Computing\",\"volume\":\"117 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Social Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SocialCom.2013.95\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Social Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SocialCom.2013.95","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Execution Context Enforcement Framework Based on Activity Detection on Data and Applications Hosted on Smart Devices
A mechanism that takes into account the combination of security requirements from independent administrative entities over a set of interacting resources on a smart device requires the ability to provide some sort of execution context control. The proposed framework consists of an architecture and a policy model. The architecture detects different events and activities (i.e. user, system, applications) and based on them enforces applicable policies and constrains the execution context for a given set of resources. The policy model offers a method to dynamically create a secure execution context by combining different types of policies (e.g. access, usage, execution) issued by different entities on protected resources.