基于智能设备上承载的数据和应用程序活动检测的安全执行上下文强制框架

Yair Diaz-Tellez, E. Bodanese, F. El-Moussa, T. Dimitrakos
{"title":"基于智能设备上承载的数据和应用程序活动检测的安全执行上下文强制框架","authors":"Yair Diaz-Tellez, E. Bodanese, F. El-Moussa, T. Dimitrakos","doi":"10.1109/SocialCom.2013.95","DOIUrl":null,"url":null,"abstract":"A mechanism that takes into account the combination of security requirements from independent administrative entities over a set of interacting resources on a smart device requires the ability to provide some sort of execution context control. The proposed framework consists of an architecture and a policy model. The architecture detects different events and activities (i.e. user, system, applications) and based on them enforces applicable policies and constrains the execution context for a given set of resources. The policy model offers a method to dynamically create a secure execution context by combining different types of policies (e.g. access, usage, execution) issued by different entities on protected resources.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"117 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Secure Execution Context Enforcement Framework Based on Activity Detection on Data and Applications Hosted on Smart Devices\",\"authors\":\"Yair Diaz-Tellez, E. Bodanese, F. El-Moussa, T. Dimitrakos\",\"doi\":\"10.1109/SocialCom.2013.95\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A mechanism that takes into account the combination of security requirements from independent administrative entities over a set of interacting resources on a smart device requires the ability to provide some sort of execution context control. The proposed framework consists of an architecture and a policy model. The architecture detects different events and activities (i.e. user, system, applications) and based on them enforces applicable policies and constrains the execution context for a given set of resources. The policy model offers a method to dynamically create a secure execution context by combining different types of policies (e.g. access, usage, execution) issued by different entities on protected resources.\",\"PeriodicalId\":129308,\"journal\":{\"name\":\"2013 International Conference on Social Computing\",\"volume\":\"117 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Social Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SocialCom.2013.95\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Social Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SocialCom.2013.95","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

考虑到智能设备上一组交互资源上独立管理实体的安全需求组合的机制需要能够提供某种类型的执行上下文控制。建议的框架由体系结构和策略模型组成。该体系结构检测不同的事件和活动(即用户、系统、应用程序),并基于它们实施适用的策略,并约束给定资源集的执行上下文。策略模型提供了一种方法,通过组合不同实体在受保护资源上发布的不同类型的策略(例如访问、使用、执行)来动态创建安全执行上下文。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Secure Execution Context Enforcement Framework Based on Activity Detection on Data and Applications Hosted on Smart Devices
A mechanism that takes into account the combination of security requirements from independent administrative entities over a set of interacting resources on a smart device requires the ability to provide some sort of execution context control. The proposed framework consists of an architecture and a policy model. The architecture detects different events and activities (i.e. user, system, applications) and based on them enforces applicable policies and constrains the execution context for a given set of resources. The policy model offers a method to dynamically create a secure execution context by combining different types of policies (e.g. access, usage, execution) issued by different entities on protected resources.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Novel Group Recommendation Algorithm with Collaborative Filtering Access Control Policy Extraction from Unconstrained Natural Language Text Stock Market Manipulation Using Cyberattacks Together with Misinformation Disseminated through Social Media Friendship Prediction on Social Network Users An Empirical Comparison of Graph Databases
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1