Personalizing context-aware access control on mobile platforms
Autor: | Prajit Kumar Das, Anupam Joshi, Tim Finin |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2017 |
Předmět: |
Information privacy
Computer science personalized access control Mobile computing user security and privacy hierarchical context ontology ontologies (artificial intelligence) Access control Context (language use) Permission 03 medical and health sciences 0302 clinical medicine Human–computer interaction mobile access control context-sensitive access control Context modeling 0501 psychology and cognitive sciences UMBC Ebiquity Research Group 050107 human factors ComputingMilieux_MISCELLANEOUS Context model business.industry context-aware access control 05 social sciences users permission control perspective Mobile telephony business Mobile device 030217 neurology & neurosurgery |
Zdroj: | CIC |
DOI: | 10.13016/m2b56d81s |
Popis: | 3rd IEEE International Conference on Collaboration and Internet Computing Context-sensitive access control has been a research topic within mobile computing for more than a decade. Much of the work has focused on modeling context and representing policies. Choosing an appropriate policy for a user, however, remains a challenging goal. Creating usable mobile access control solutions have been researched from a users permission control perspective. We present a study carried out with subjects using their personal mobile devices that captures individualized policies through an iterative user feedback process. Policy precision, also referred to as "Violation Metric" (VM), was used to decide when all necessary policies had been captured. The feedback process used a hierarchical context ontology to represent user-context and gathered contextual-situations in which a policy would be applicable. The study also investigated the feasibility of using the VM measure to determine completion of the capture process for the users personalized access control policies, that handles their mobile privacy and security needs. Using an appropriate predefined policy is shown to have lesser user impact when trying to personalize access control policies for users. |
Databáze: | OpenAIRE |
Externí odkaz: |