Mobility

Context-Dependent Authentication and Access Control

Free registration required

Executive Summary

As mobile computing continues to rise, users are increasingly able to connect to remote services from a wide range of settings. To provide this flexibility, security policies must be adaptive to the user's environment when the request is made. In the work, the authors define context to include the spatiotemporal aspects of the user request, in addition to quantifiable environmental factors determined by the server hosting the resource. They identify a number of key open problems in this field and propose potential solutions to some of the problems.

  • Format: PDF
  • Size: 144.09 KB