Capturing policies for fine-grained access control on mobile devices

被引:0
|
作者
Das, Prajit Kumar [1 ]
Joshi, Anupam [1 ]
Finin, Tim [1 ]
机构
[1] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21228 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/CIC.2016.19
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As of 2016, there are more mobile devices than humans on earth. Today, mobile devices are a critical part of our lives and often hold sensitive corporate and personal data. As a result, they are a lucrative target for attackers, and managing data privacy and security on mobile devices has become a vital issue. Existing access control mechanisms in most devices are restrictive and inadequate. They do not take into account the context of a device and its user when making decisions. In many cases, the access granted to a subject should change based on the context of a device. Such fine-grained, context-sensitive access control policies have to be personalized too. In this paper, we present a system i.e. MITHRIL that uses policies represented in Semantic Web technologies and captured using user feedback, to handle access control on mobile devices. We present an iterative feedback process to capture user specific policy. We also present a policy violation metric that allows us to decide when the capture process is complete.
引用
收藏
页码:54 / 63
页数:10
相关论文
共 50 条
  • [21] Extending the Java']Java Virtual Machine to enforce fine-grained security policies in mobile devices
    Ion, Iulia
    Dragovic, Boris
    Crispo, Bruno
    TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 233 - +
  • [22] Computational complexity of the problem of tree generation under fine-grained access control policies
    Moore, N.
    INFORMATION AND COMPUTATION, 2011, 209 (03) : 548 - 567
  • [23] Access policy sheet for access control in fine-grained XML
    Wu, J
    Mu, Y
    Seberry, J
    Ruan, C
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 1273 - 1282
  • [24] Privacy preserving fine-grained location-based access control for mobile cloud
    Baseri, Yaser
    Hafid, Abdelhakim
    Cherkaoui, Soumaya
    COMPUTERS & SECURITY, 2018, 73 : 249 - 265
  • [25] Secure Fine-Grained Access Control of Mobile User Data through Untrusted Cloud
    Zhou, Kai
    Ren, Jian
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [26] Fine-Grained Access Control for Hybrid Mobile Applications in Android Using Restricted Paths
    Pooryousef, Shahrooz
    Amini, Morteza
    2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2016, : 85 - 90
  • [27] PowerSpy: Fine-grained software energy profiling for mobile devices
    Banerjee, KS
    Agu, E
    2005 International Conference on Wireless Networks, Communications and Mobile Computing, Vols 1 and 2, 2005, : 1136 - 1141
  • [28] Fine-Grained Data Sharing in Cloud Computing for Mobile Devices
    Shao, Jun
    Lu, Rongxing
    Lin, Xiaodong
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [29] Declarative Cartography under Fine-Grained Access Control
    Jensen, Thomas
    Salles, Marcos Antonio Vaz
    Bang, Michael Vindahl
    30TH INTERNATIONAL CONFERENCE ON SCIENTIFIC AND STATISTICAL DATABASE MANAGEMENT (SSDBM 2018), 2018,
  • [30] The Fine-Grained Security Access Control of Spatial Data
    Ma, Fuguang
    Gao, Yong
    Yan, Menglong
    Xu, Fuchun
    Liu, Ding
    2010 18TH INTERNATIONAL CONFERENCE ON GEOINFORMATICS, 2010,