DocumentCode
3320355
Title
Towards shrink-wrapped security: A taxonomy of security-relevant context
Author
Johnson, Gleneesha M.
Author_Institution
Univ. of Maryland, College Park, MD
fYear
2009
fDate
9-13 March 2009
Firstpage
1
Lastpage
2
Abstract
The emerging mobile computing paradigm makes it feasible for workers to access corporate resources anytime and anywhere. While ubiquitous access has its benefits, it creates unique challenges for maintaining the security of these resources - challenges that traditional, context-insensitive approaches to security are not appropriate to handle. We propose the notion of shrink-wrapped security, in which a tight coupling is provided between a user´s situation and security. In order to support shrink-wrapped security, a more comprehensive notion of context than what is currently used by context-aware security systems is necessary. This paper presents a first step towards achieving shrink-wrapped security by addressing a key challenge that developers of context-aware systems face...identifying relevant context.
Keywords
mobile computing; security of data; context-aware security systems; corporate resources; mobile computing; security-relevant context taxonomy; shrink-wrapped security; ubiquitous access; Application software; Appropriate technology; Availability; Communication system security; Educational institutions; Information security; Mobile computing; Pervasive computing; Portable computers; Taxonomy;
fLanguage
English
Publisher
ieee
Conference_Titel
Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on
Conference_Location
Galveston, TX
Print_ISBN
978-1-4244-3304-9
Electronic_ISBN
978-1-4244-3304-9
Type
conf
DOI
10.1109/PERCOM.2009.4912819
Filename
4912819
Link To Document