Inproceedings1794: Unterschied zwischen den Versionen
K (Added from ontology) |
K (Wikipedia python library) |
||
Zeile 39: | Zeile 39: | ||
|DOI Name= | |DOI Name= | ||
|Projekt=ModiFrame, | |Projekt=ModiFrame, | ||
− | |Forschungsgruppe= | + | |Forschungsgruppe=Betriebliche Informations- und Kommunikationssysteme |
}} | }} | ||
{{Forschungsgebiet Auswahl | {{Forschungsgebiet Auswahl | ||
|Forschungsgebiet=Mobile Technologien | |Forschungsgebiet=Mobile Technologien | ||
}} | }} |
Version vom 16. Oktober 2009, 23:07 Uhr
A Security Model for Mobile Processes
A Security Model for Mobile Processes
Published: 2008
Juli
Buchtitel: m-business 2008: 7th International Conference on Mobile Business (ICMB 08)
Seiten: 211-220
Verlag: IEEE
Erscheinungsort: Barcelona, Spain
Referierte Veröffentlichung
BibTeX
Kurzfassung
Technologies like mobile devices (e.g. PDAs, smartphones,
notebooks) and wireless data communication (e.g.
GPRS, UMTS, WiFi) have a great potential for the improvement
of mobile processes, e.g. by enabling access to timecritical
information and preventing media disruptions. But
the usage of these technologies leads also to specific challenges,
particularly with regard to security and usability.
One approach to deal with mobile-specific security concerns
is to control access to functions provided by mobile
information systems depending on the current location of
the user, e.g. a travelling salesman should only be allowed
to enter a customer's order when he currently resides at the
premises of that customer. A formal model to write down
such rules is called "security model". There are already
some security models which take the user's location into
account when deciding which functions of a system a certain
user is allowed to use but they are process-agnostic, i.e.
location-restrictions at process level cannot be expressed.
In literature also security models for process-aware information
system can be found but they don't consider location.
In our work we therefore propose a security model for
mobile processes based on an elicitation of requirements.
Betriebliche Informations- und Kommunikationssysteme„Betriebliche Informations- und Kommunikationssysteme“ befindet sich nicht in der Liste (Effiziente Algorithmen, Komplexitätsmanagement, Betriebliche Informationssysteme, Wissensmanagement, Angewandte Technisch-Kognitive Systeme, Information Service Engineering, Critical Information Infrastructures, Web Science und Wissensmanagement, Web Science, Ökonomie und Technologie der eOrganisation, ...) zulässiger Werte für das Attribut „Forschungsgruppe“.