z-logo
open-access-imgOpen Access
Data Sharing for Context-Sensitive Access Control Policy Evaluation and Enforcement
Author(s) -
Hassan Rasheed
Publication year - 2012
Publication title -
international journal of computer network and information security
Language(s) - English
Resource type - Journals
eISSN - 2074-9104
pISSN - 2074-9090
DOI - 10.5815/ijcnis.2012.11.02
Subject(s) - computer science , enforcement , context (archaeology) , access control , block (permutation group theory) , data sharing , computer security , order (exchange) , security policy , control (management) , representation (politics) , risk analysis (engineering) , business , artificial intelligence , medicine , paleontology , alternative medicine , pathology , political science , law , biology , geometry , mathematics , finance , politics
Context-awareness has long been an important building block in designing systems that vary their operating behavior based on an analysis of rapidly changing operating conditions. There is the need however to define context more formally so that context data- sharing can take place between systems and more complex interactions between connected systems can be developed. The area of computer security is examined in particular as an area where the representation and sharing of context data can lead to more effective policy enforcement. A framework is proposed for sharing data between assessment sensors and enforcement mechanisms in order to facilitate more accurate policy enforcement. A detailed performance analysis of the proposed system is offered along with conclusions on the feasibility of such systems.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom