• DocumentCode
    3320355
  • Title

    Towards shrink-wrapped security: A taxonomy of security-relevant context

  • Author

    Johnson, Gleneesha M.

  • Author_Institution
    Univ. of Maryland, College Park, MD
  • fYear
    2009
  • fDate
    9-13 March 2009
  • Firstpage
    1
  • Lastpage
    2
  • Abstract
    The emerging mobile computing paradigm makes it feasible for workers to access corporate resources anytime and anywhere. While ubiquitous access has its benefits, it creates unique challenges for maintaining the security of these resources - challenges that traditional, context-insensitive approaches to security are not appropriate to handle. We propose the notion of shrink-wrapped security, in which a tight coupling is provided between a user´s situation and security. In order to support shrink-wrapped security, a more comprehensive notion of context than what is currently used by context-aware security systems is necessary. This paper presents a first step towards achieving shrink-wrapped security by addressing a key challenge that developers of context-aware systems face...identifying relevant context.
  • Keywords
    mobile computing; security of data; context-aware security systems; corporate resources; mobile computing; security-relevant context taxonomy; shrink-wrapped security; ubiquitous access; Application software; Appropriate technology; Availability; Communication system security; Educational institutions; Information security; Mobile computing; Pervasive computing; Portable computers; Taxonomy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on
  • Conference_Location
    Galveston, TX
  • Print_ISBN
    978-1-4244-3304-9
  • Electronic_ISBN
    978-1-4244-3304-9
  • Type

    conf

  • DOI
    10.1109/PERCOM.2009.4912819
  • Filename
    4912819