[PDF][PDF] Context-aware authentication for the internet of things

K Habib, W Leister - Elev. Int. Conf. Auton. Auton. Syst. fined, 2015 - academia.edu
Many traditional authentication and access control mechanisms do not use context-aware
approach, ie, those mechanisms do not incorporate context parameters while making …

Context-aware authentication framework

D Goel, E Kher, S Joag, V Mujumdar, M Griss… - … Conference on Mobile …, 2009 - Springer
We present an extensible context-aware authentication framework which can adapt to the
contextual information available in a smart environment. Having confidence in a user's …

ontext-aware security and secure context-awareness in ubiquitous computing environments

K Wrona, L Gomez - Annales Universitatis Mariae Curie …, 2006 - journals.umcs.pl
Context-awareness emerges as an important element of future wireless systems. In
particular, concepts like ambient intelligence and ubiquitous computing rely on context …

[PDF][PDF] Review on the security related issues in context aware system

S Almutairi, H Aldabbas… - International Journal of …, 2012 - researchgate.net
ABSTRACT A context aware system is recognized as a “system which uses any context
information previous to, or in the duration of, service stipulations”, whereas the main goal of …

[PDF][PDF] An ontology based approach for context-aware security in the internet of things (IoT)

A Nazir, S Sholla, A Bashir - International Journal of Wireless …, 2021 - scholar.archive.org
Due to increased number of IoT devices, the marketplace is showing significant growth of
sensor deployments around the world. The context involved in any IoT environment needs …

Context-aware security in the internet of things: a survey

T Sylla, MA Chalouf, F Krief… - International journal of …, 2021 - inderscienceonline.com
Internet of things (IoT) applications encompass home-automation, health, transportation, etc.
The main objective of these applications is to improve user's lives. However, security and …

A generic framework for context-based distributed authorizations

GK Mostéfaoui, P Brézillon - … Conference on Modeling and Using Context, 2003 - Springer
In conventional security systems, protected resources such as documents, hardware devices
and software applications follow an On/Off access policy. On, allows to grant access and off …

A context-aware authentication system for mobile cloud computing

K Benzekki, A El Fergougui, AEB ElAlaoui - Procedia Computer Science, 2018 - Elsevier
Context-aware authentication systems are becoming more and more interesting, as mobile
devices are using pervasive computing environments. They can be implemented in different …

ICAF: A context-aware framework for access control

ASM Kayes, J Han, A Colman - … 2012, Wollongong, NSW, Australia, July 9 …, 2012 - Springer
Context-aware systems acquire and integrate multi-faceted knowledge about their
environments in order to make decisions. A number of attempts to build frameworks for …

Architecture of context-aware integrated security management systems for smart home environment

SH Park, JS Cho, SM Jung, YJ Han… - Asia-Pacific Network …, 2007 - Springer
The smart home technology is a noticeable area of study in various studies on the
ubiquitous computing technology. This paper presents the security management system to …