As mobile computing continues to rise, users are increasingly able to connect to remote services from a wide range of settings. To provide this flexibility, security policies must be adaptive to the user's environment when the request is made. In our work, we define context to include the spatiotemporal aspects of the user request, in addition to quantifiable environmental factors determined by the server hosting the resource. We identify a number of key open problems in this field and propose potential solutions to some of the problems. © IFIP International Federation for Information Processing 2009.
CITATION STYLE
Kirkpatrick, M., & Bertino, E. (2009). Context-dependent authentication and access control. In IFIP Advances in Information and Communication Technology (Vol. 309, pp. 63–75). https://doi.org/10.1007/978-3-642-05437-2_6
Mendeley helps you to discover research relevant for your work.