Toward exploiting location-based and video information in negotiated access control policies

Ernesto Damiani, Marco Anisetti, Valerio Bellandi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

As the global information infrastructure is becoming more and more ubiquitous, digital business transactions are increasingly performed using a variety of mobile devices and across multiple communication channels. In this new paradigm of pervasive access, a much richer context representation regarding both users and the resources they access could be available to applications, potentially supporting highly expressive and intelligent policies regulating access and fruition, On the other hand, checking advanced context-related information when evaluating a policy involves several unsolved research issues, often due to underlying technology. Predicates representing users position and posture (e.g., as shown in a video feed), for instance, are Facesemantically different from traditional ones inasmuch their outcome is both highly dynamic and uncertain. The aim of this work is twofold: (i) presenting some of our recent work in dynamic context representation, including data streams encoding users location and video images, (ii) discussing the integration of dynamic context representation within current approaches to negotiated access control in a mobile environment.

Original languageBritish English
Title of host publicationInformation Systems Security - First International Conference, ICISS 2005, Proceedings
Pages21-35
Number of pages15
DOIs
StatePublished - 2005
Event1st International Conference on Information Systems Security, ICISS 2005 - Kolkata, India
Duration: 19 Dec 200521 Dec 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3803 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Conference on Information Systems Security, ICISS 2005
Country/TerritoryIndia
CityKolkata
Period19/12/0521/12/05

Fingerprint

Dive into the research topics of 'Toward exploiting location-based and video information in negotiated access control policies'. Together they form a unique fingerprint.

Cite this