TU Darmstadt / ULB / TUbiblio

Towards security policy decisions based on context profiling

Miettinen, Markus ; Asokan, N. (2010)
Towards security policy decisions based on context profiling.
Chicago, Illinois, USA
doi: 10.1145/1866423.1866428
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

With the increasing popularity of personal mobile devices like smartphones, more and more ordinary users create and consume valuable, private and sensitive data such as photos, videos, messages, documents as well as access credentials for various resources and services. Without proper access control policies, such data may be disclosed in ways that the user did not intend. Although various applications and services support the possibility of fine-grained security and privacy policies, end users are not capable of understanding or adjusting the policies to suit their needs.

In this position paper we argue that context information can be used to infer likely access control policies. We motivate by briefly describing three usage scenarios where context related to the location of a device can be used to set access control policies. We argue that a simple measure like the "familiarity" of a device and/or context can be calculated and used to infer appropriate policy settings. Finally, we report on our experience in using context observations collected from the devices of two test participants over a period of time.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2010
Autor(en): Miettinen, Markus ; Asokan, N.
Art des Eintrags: Bibliographie
Titel: Towards security policy decisions based on context profiling
Sprache: Deutsch
Publikationsjahr: 2010
Verlag: ACM
Buchtitel: Proceedings of the 3rd ACM workshop on Artificial intelligence and security (AISec '10)
Reihe: AISec '10
Veranstaltungsort: Chicago, Illinois, USA
DOI: 10.1145/1866423.1866428
Kurzbeschreibung (Abstract):

With the increasing popularity of personal mobile devices like smartphones, more and more ordinary users create and consume valuable, private and sensitive data such as photos, videos, messages, documents as well as access credentials for various resources and services. Without proper access control policies, such data may be disclosed in ways that the user did not intend. Although various applications and services support the possibility of fine-grained security and privacy policies, end users are not capable of understanding or adjusting the policies to suit their needs.

In this position paper we argue that context information can be used to infer likely access control policies. We motivate by briefly describing three usage scenarios where context related to the location of a device can be used to set access control policies. We argue that a simple measure like the "familiarity" of a device and/or context can be calculated and used to infer appropriate policy settings. Finally, we report on our experience in using context observations collected from the devices of two test participants over a period of time.

Freie Schlagworte: context profiling, context-sensitivity, policy decision making, security policies
ID-Nummer: TUD-CS-2010-23866
Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Systemsicherheit
Hinterlegungsdatum: 07 Aug 2016 23:07
Letzte Änderung: 27 Sep 2018 09:20
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen