Research Article
PBAC4M: Provenance-Based Access Control for Mobile
@INPROCEEDINGS{10.4108/eai.7-11-2017.2273437, author={Anne-Marie Lesas and Omar Boucelma and Julien Lacroix}, title={PBAC4M: Provenance-Based Access Control for Mobile}, proceedings={14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services}, publisher={ACM}, proceedings_a={MOBIQUITOUS}, year={2018}, month={4}, keywords={access control mobile computing provenance secure transactions}, doi={10.4108/eai.7-11-2017.2273437} }
- Anne-Marie Lesas
Omar Boucelma
Julien Lacroix
Year: 2018
PBAC4M: Provenance-Based Access Control for Mobile
MOBIQUITOUS
ACM
DOI: 10.4108/eai.7-11-2017.2273437
Abstract
With the advent of mobiquitous technologies, security became a critical concern for digital services providers who wish to control access to their resources deployed in distributed and mobile environments. Traditional access control methods are no longer sufficient to protect themselves from hacking attempts to which resources are exposed in these open environments. We propose a complementary new approach based on Provenance which makes it possible to check that a request for access to a digital resource is compliant with the predefined use case and access rules.
Copyright © 2017–2024 EAI