Securing context-aware applications using environment roles

  • Covington M
  • Long W
  • Srinivasan S
 et al. 
  • 97


    Mendeley users who have this article in their library.
  • 292


    Citations of this article.


In the future, a largely invisible and ubiquitous computing infrastructure will assist people with a variety of activities in the home and at work. The applications that will be deployed in such systems will create and manipulate private information and will provide access to a variety of other resources. Securing such applications is challenging for a number of reasons. Unlike traditional systems where access control has been explored, access decisions may depend on the context in which requests are made. We show how the well-developed notion of roles can be used to capture securityrelevant context of the environment in which access requests are made. By introducing environment roles, we create a uniform access control framework that can be used to secure context-aware applications. We also present a security architecture that supports security policies that make use of environment roles to control access to resources.

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document


  • Michael J. Covington

  • Wende Long

  • Srividhya Srinivasan

  • Anind K. Dev

  • Mustaque Ahamad

  • Gregory D. Abowd

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free