skip to main content
10.1145/1866423.1866428acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Towards security policy decisions based on context profiling

Published: 08 October 2010 Publication History

Abstract

With the increasing popularity of personal mobile devices like smartphones, more and more ordinary users create and consume valuable, private and sensitive data such as photos, videos, messages, documents as well as access credentials for various resources and services. Without proper access control policies, such data may be disclosed in ways that the user did not intend. Although various applications and services support the possibility of fine-grained security and privacy policies, end users are not capable of understanding or adjusting the policies to suit their needs.
In this position paper we argue that context information can be used to infer likely access control policies. We motivate by briefly describing three usage scenarios where context related to the location of a device can be used to set access control policies. We argue that a simple measure like the "familiarity" of a device and/or context can be calculated and used to infer appropriate policy settings. Finally, we report on our experience in using context observations collected from the devices of two test participants over a period of time.

References

[1]
]]George Danezis. Inferring privacy policies for social networking services. In Proceedings of AISec'09, pages 5--9. ACM, Nov 2009.
[2]
]]W. Keith Edwards, Erika Shehan Poole, and Jennifer Stoll. Security automation considered harmful? In NSPW '07: Proceedings of the 2007 Workshop on New Security Paradigms, pages 33--42, New York, NY, USA, 2008. ACM.
[3]
]]Rachel Greenstadt and Jacob Beal. Cognitive security for personal devices. In Proceedings of AISec'08, pages 27--30. ACM, Oct 2008.
[4]
]]Markus Jakobsson et al. Implicit authentication for mobile devices. In Proceddings of the 4th Usenix Workshop on Hot Topocs in Security (HotSec '09). Usenix, Aug 2009. http://www.usenix.org/event/hotsec09/tech/full_papers/jakobsson.pdf.
[5]
]]Patrick Gage Kelley et al. User-controllable learning of security and privacy policies. In Proceedings of AISec'08, pages 11--18. ACM, Oct 2008.
[6]
]]Mika Klemettinen. Enabling technologies for mobile services : the MobiLife book. J. Wiley, Chichester, England; Hoboken, NJ, 2007.
[7]
]]Eric Paulos and Elizabeth Goodman. The familiar stranger: anxiety, comfort, and play in public places. In CHI '04: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 223--230, New York, NY, USA, 2004. ACM.

Cited By

View all
  • (2016)A machine-learning based approach to privacy-aware information-sharing in mobile social networksPervasive and Mobile Computing10.1016/j.pmcj.2015.01.00625(125-142)Online publication date: Jan-2016
  • (2016)Clustering Context Items into User Trust LevelsDependability Engineering and Complex Systems10.1007/978-3-319-39639-2_29(333-342)Online publication date: 18-Jun-2016
  • (2013)Adaptive information-sharing for privacy-aware mobile social networksProceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing10.1145/2493432.2493510(657-666)Online publication date: 8-Sep-2013
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AISec '10: Proceedings of the 3rd ACM workshop on Artificial intelligence and security
October 2010
78 pages
ISBN:9781450300889
DOI:10.1145/1866423
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 October 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. context profiling
  2. context-sensitivity
  3. policy decision making
  4. security policies

Qualifiers

  • Research-article

Conference

CCS '10
Sponsor:

Acceptance Rates

AISec '10 Paper Acceptance Rate 10 of 15 submissions, 67%;
Overall Acceptance Rate 94 of 231 submissions, 41%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2016)A machine-learning based approach to privacy-aware information-sharing in mobile social networksPervasive and Mobile Computing10.1016/j.pmcj.2015.01.00625(125-142)Online publication date: Jan-2016
  • (2016)Clustering Context Items into User Trust LevelsDependability Engineering and Complex Systems10.1007/978-3-319-39639-2_29(333-342)Online publication date: 18-Jun-2016
  • (2013)Adaptive information-sharing for privacy-aware mobile social networksProceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing10.1145/2493432.2493510(657-666)Online publication date: 8-Sep-2013
  • (2012)PeerSense: Who is near you?2012 IEEE International Conference on Pervasive Computing and Communications Workshops10.1109/PerComW.2012.6197553(516-518)Online publication date: Mar-2012
  • (2012)Usable mobile securityProceedings of the 8th international conference on Distributed Computing and Internet Technology10.1007/978-3-642-28073-3_1(1-6)Online publication date: 2-Feb-2012
  • (2011)Using context-profiling to aid access control decisions in mobile devices2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)10.1109/PERCOMW.2011.5766891(310-312)Online publication date: Mar-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media