Title :
Towards shrink-wrapped security: A taxonomy of security-relevant context
Author :
Johnson, Gleneesha M.
Author_Institution :
Univ. of Maryland, College Park, MD
Abstract :
The emerging mobile computing paradigm makes it feasible for workers to access corporate resources anytime and anywhere. While ubiquitous access has its benefits, it creates unique challenges for maintaining the security of these resources - challenges that traditional, context-insensitive approaches to security are not appropriate to handle. We propose the notion of shrink-wrapped security, in which a tight coupling is provided between a user´s situation and security. In order to support shrink-wrapped security, a more comprehensive notion of context than what is currently used by context-aware security systems is necessary. This paper presents a first step towards achieving shrink-wrapped security by addressing a key challenge that developers of context-aware systems face...identifying relevant context.
Keywords :
mobile computing; security of data; context-aware security systems; corporate resources; mobile computing; security-relevant context taxonomy; shrink-wrapped security; ubiquitous access; Application software; Appropriate technology; Availability; Communication system security; Educational institutions; Information security; Mobile computing; Pervasive computing; Portable computers; Taxonomy;
Conference_Titel :
Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on
Conference_Location :
Galveston, TX
Print_ISBN :
978-1-4244-3304-9
Electronic_ISBN :
978-1-4244-3304-9
DOI :
10.1109/PERCOM.2009.4912819