走向封装安全性:与安全性相关的上下文的分类法

Gleneesha Johnson
{"title":"走向封装安全性:与安全性相关的上下文的分类法","authors":"Gleneesha Johnson","doi":"10.1109/PERCOM.2009.4912819","DOIUrl":null,"url":null,"abstract":"The emerging mobile computing paradigm makes it feasible for workers to access corporate resources anytime and anywhere. While ubiquitous access has its benefits, it creates unique challenges for maintaining the security of these resources - challenges that traditional, context-insensitive approaches to security are not appropriate to handle. We propose the notion of shrink-wrapped security, in which a tight coupling is provided between a user's situation and security. In order to support shrink-wrapped security, a more comprehensive notion of context than what is currently used by context-aware security systems is necessary. This paper presents a first step towards achieving shrink-wrapped security by addressing a key challenge that developers of context-aware systems face…identifying relevant context.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Towards shrink-wrapped security: A taxonomy of security-relevant context\",\"authors\":\"Gleneesha Johnson\",\"doi\":\"10.1109/PERCOM.2009.4912819\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The emerging mobile computing paradigm makes it feasible for workers to access corporate resources anytime and anywhere. While ubiquitous access has its benefits, it creates unique challenges for maintaining the security of these resources - challenges that traditional, context-insensitive approaches to security are not appropriate to handle. We propose the notion of shrink-wrapped security, in which a tight coupling is provided between a user's situation and security. In order to support shrink-wrapped security, a more comprehensive notion of context than what is currently used by context-aware security systems is necessary. This paper presents a first step towards achieving shrink-wrapped security by addressing a key challenge that developers of context-aware systems face…identifying relevant context.\",\"PeriodicalId\":322416,\"journal\":{\"name\":\"2009 IEEE International Conference on Pervasive Computing and Communications\",\"volume\":\"75 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-03-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Conference on Pervasive Computing and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PERCOM.2009.4912819\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Pervasive Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PERCOM.2009.4912819","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16

摘要

新兴的移动计算范式使得员工随时随地访问公司资源成为可能。尽管无处不在的访问有其好处,但它为维护这些资源的安全性带来了独特的挑战——传统的、对上下文不敏感的安全方法不适合处理这些挑战。我们提出了收缩包装安全性的概念,其中在用户的情况和安全性之间提供了紧密耦合。为了支持收缩包装安全性,需要一种比当前上下文感知安全系统所使用的更全面的上下文概念。本文通过解决上下文感知系统开发人员面临的一个关键挑战——识别相关的上下文,向实现收缩包装安全性迈出了第一步。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Towards shrink-wrapped security: A taxonomy of security-relevant context
The emerging mobile computing paradigm makes it feasible for workers to access corporate resources anytime and anywhere. While ubiquitous access has its benefits, it creates unique challenges for maintaining the security of these resources - challenges that traditional, context-insensitive approaches to security are not appropriate to handle. We propose the notion of shrink-wrapped security, in which a tight coupling is provided between a user's situation and security. In order to support shrink-wrapped security, a more comprehensive notion of context than what is currently used by context-aware security systems is necessary. This paper presents a first step towards achieving shrink-wrapped security by addressing a key challenge that developers of context-aware systems face…identifying relevant context.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信