{"title":"走向封装安全性:与安全性相关的上下文的分类法","authors":"Gleneesha Johnson","doi":"10.1109/PERCOM.2009.4912819","DOIUrl":null,"url":null,"abstract":"The emerging mobile computing paradigm makes it feasible for workers to access corporate resources anytime and anywhere. While ubiquitous access has its benefits, it creates unique challenges for maintaining the security of these resources - challenges that traditional, context-insensitive approaches to security are not appropriate to handle. We propose the notion of shrink-wrapped security, in which a tight coupling is provided between a user's situation and security. In order to support shrink-wrapped security, a more comprehensive notion of context than what is currently used by context-aware security systems is necessary. This paper presents a first step towards achieving shrink-wrapped security by addressing a key challenge that developers of context-aware systems face…identifying relevant context.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Towards shrink-wrapped security: A taxonomy of security-relevant context\",\"authors\":\"Gleneesha Johnson\",\"doi\":\"10.1109/PERCOM.2009.4912819\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The emerging mobile computing paradigm makes it feasible for workers to access corporate resources anytime and anywhere. While ubiquitous access has its benefits, it creates unique challenges for maintaining the security of these resources - challenges that traditional, context-insensitive approaches to security are not appropriate to handle. We propose the notion of shrink-wrapped security, in which a tight coupling is provided between a user's situation and security. In order to support shrink-wrapped security, a more comprehensive notion of context than what is currently used by context-aware security systems is necessary. This paper presents a first step towards achieving shrink-wrapped security by addressing a key challenge that developers of context-aware systems face…identifying relevant context.\",\"PeriodicalId\":322416,\"journal\":{\"name\":\"2009 IEEE International Conference on Pervasive Computing and Communications\",\"volume\":\"75 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-03-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Conference on Pervasive Computing and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PERCOM.2009.4912819\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Pervasive Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PERCOM.2009.4912819","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards shrink-wrapped security: A taxonomy of security-relevant context
The emerging mobile computing paradigm makes it feasible for workers to access corporate resources anytime and anywhere. While ubiquitous access has its benefits, it creates unique challenges for maintaining the security of these resources - challenges that traditional, context-insensitive approaches to security are not appropriate to handle. We propose the notion of shrink-wrapped security, in which a tight coupling is provided between a user's situation and security. In order to support shrink-wrapped security, a more comprehensive notion of context than what is currently used by context-aware security systems is necessary. This paper presents a first step towards achieving shrink-wrapped security by addressing a key challenge that developers of context-aware systems face…identifying relevant context.