This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Context-Aware Adaptation of Access-Control Policies
January/February 2008 (vol. 12 no. 1)
pp. 51-54
Arjmand Samuel, Purdue University
Arif Ghafoor, Purdue University
Elisa Bertino, Purdue University
Today, public-service delivery mechanisms such as hospitals, police, and fire departments rely on digital generation, storage, and analysis of vital information. To protect critical digital resources, these organizations employ access-control mechanisms, which define rules under which authorized users can access the resources they need to perform organizational tasks. Natural or man-made disasters pose a unique challenge, whereby previously defined constraints can potentially debilitate an organization’s ability to act. Here, the authors propose employing contextual parameters — specifically, activity context in the form of emergency warnings — to adapt access-control policies according to a priori configuration.

1. S.L. Osborn, R.S. Sandhu, and Q. Munawer, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Trans. Information and System Security, vol. 3, no. 2, 2000, pp. 85–106.
2. R.S. Sandhu, D.F. Ferraiolo, and D.R. Kuhn, "The NIST Model for Role-Based Access Control: Towards a Unified Standard," Proc. ACM Workshop on Role-Based Access Control, ACM Press, 2000, pp. 47–63.
3. J. Joshi et al., "A Generalized Temporal Role-Based Access Control Model," IEEE Trans. Knowledge and Data Engineering, vol. 17, no. 1, 2005, pp. 4–23.
4. A. Samuel, A. Ghafoor, and E. Bertino, Framework for Specification and Verification of Generalized Spatio-temporal Role-based Access Control Model, tech. report TR 2007-08, CERIAS, 2007.
5. G.D. Abowd et al., "Towards a Better Understanding of Context and Context-Awareness," Handheld and Ubiquitous Computing, Springer, 1999, pp. 304–307.

Index Terms:
context-aware adaptation, access control, access-control policies, crisis management, emergency response, privacy
Citation:
Arjmand Samuel, Arif Ghafoor, Elisa Bertino, "Context-Aware Adaptation of Access-Control Policies," IEEE Internet Computing, vol. 12, no. 1, pp. 51-54, Jan.-Feb. 2008, doi:10.1109/MIC.2008.6
Usage of this product signifies your acceptance of the Terms of Use.