Development of the system which provides services using diverse sensors is expanding due to the widespread use of ubiquitous technology, and the research on the security technologies gaining attention to solve the vulnerability of ubiquitous environment's security. However, there are many instances in ...
The present invention generally relates to a context-aware security self-assessment method or module that determines the context in which the device is used and based on this, assesses the devices security settings. The context may refer to the system environment, the applications the device is ...
The present invention generally relates to a context-aware security self-assessment method or module that determines the context in which the device is used and based on this, assesses the devices security settings. The context may refer to the system environment, the applications the device is us...
This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware environment. It helps developers build secure services efficiently. A security service in a dynamic environment uses Multi-Attribute...
Authentication model in the wireless environment has many security vulnerabilities. However, there is no adapting standard method in this field. To solve these problems, we suggest a flexible integrated authentication and access control facility using context-awareness, integrated authentication, access cont...
Portshif announced the company’s new K8SHIELD™ Framework and the introduction of context aware security policy enablement. These enhancements (...)
Security and trust in context-aware applications We describe work on representing and using a rich notion of context that goes beyond current networking applications focusing mostly on location. Our context model includes location and surroundings, the presence of people and devices, i... R Mayrhofe...
As context-aware systems are leaving the laboratories and enter the life of a growing portion of the population, it becomes increasingly important to ensure that crucial features of security and privacy are added to foster and maintain the trust of users. This transition from applications in the ...
The system supports the management and enforcement of context-aware security and the management of the context of users and resources. This system provides the security service functions such as the partial credential based user authentication and context-aware access control, and the security policy ...
After providing a detailed introduction to context-aware applications, the security challenges of context-aware applications from the perspectives of different principals (i.e. mobile users, the broker, service providers) are analyzed. The privacy aspects, the challenges, the threats and legal ...