Towards shrink-wrapped security: A taxonomy of security-relevant context
暂无分享,去创建一个
The emerging mobile computing paradigm makes it feasible for workers to access corporate resources anytime and anywhere. While ubiquitous access has its benefits, it creates unique challenges for maintaining the security of these resources - challenges that traditional, context-insensitive approaches to security are not appropriate to handle. We propose the notion of shrink-wrapped security, in which a tight coupling is provided between a user's situation and security. In order to support shrink-wrapped security, a more comprehensive notion of context than what is currently used by context-aware security systems is necessary. This paper presents a first step towards achieving shrink-wrapped security by addressing a key challenge that developers of context-aware systems face…identifying relevant context.
[1] Guanling Chen,et al. A Survey of Context-Aware Mobile Computing Research , 2000 .
[2] Gregory D. Abowd,et al. Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.
[3] Erland Jonsson,et al. How to systematically classify computer security intrusions , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[4] Louise Barkhuus,et al. Context Information vs . Sensor Information : A Model for Categorizing Context in Context-Aware Mobile Computing , 2002 .