TY - GEN
T1 - Situation-based policy enforcement
AU - Buntrock, Thomas
AU - Esperer, Hans Christian
AU - Eckert, Claudia
PY - 2007
Y1 - 2007
N2 - Current operating systems enforce access control policies based on completely static rules, a method originating from a time where computers were expensive and had to serve several users simultaneously. Today, as computers are cheap, a trend to mobile workstations can be realized, where a single device is used to perform a dedicated task under unpredictable, changing conditions. However, the static access rules still remain, while their use in mobile environments is limited, because in changing environments, access rights must constantly be adjusted to guarantee data integrity in all situations. With dynamically adjusting rules, in turn, it is not sufficient anymore to check access to data only once; instead, access rights must be revalidated every time data is actually accessed, even if part of that data is cached by an application. In this paper, we present a method to dynamically and retrospectively enforce access control policies based on the context a device is operating in, while tracing data beyond disk accesses.
AB - Current operating systems enforce access control policies based on completely static rules, a method originating from a time where computers were expensive and had to serve several users simultaneously. Today, as computers are cheap, a trend to mobile workstations can be realized, where a single device is used to perform a dedicated task under unpredictable, changing conditions. However, the static access rules still remain, while their use in mobile environments is limited, because in changing environments, access rights must constantly be adjusted to guarantee data integrity in all situations. With dynamically adjusting rules, in turn, it is not sufficient anymore to check access to data only once; instead, access rights must be revalidated every time data is actually accessed, even if part of that data is cached by an application. In this paper, we present a method to dynamically and retrospectively enforce access control policies based on the context a device is operating in, while tracing data beyond disk accesses.
UR - http://www.scopus.com/inward/record.url?scp=37249038522&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-74409-2_21
DO - 10.1007/978-3-540-74409-2_21
M3 - Conference contribution
AN - SCOPUS:37249038522
SN - 9783540744085
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 190
EP - 200
BT - Trust, Privacy and Security in Digital Business - 4th International Conference, TrustBus 2007, Proceedings
PB - Springer Verlag
T2 - 4th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2007
Y2 - 4 September 2007 through 6 September 2007
ER -