Skip to main content

Multidimensional Context Awareness in Mobile Devices

  • Conference paper
MultiMedia Modeling (MMM 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8936))

Included in the following conference series:

  • 3846 Accesses

Abstract

With the increase of mobile computation ability and the development of wireless network transmission technology, mobile devices not only are the important tools of personal life (e.g., education and entertainment), but also emerge as indispensable ”secretary” of business activities (e.g., email and phone call). However, since mobile devices could work under complex and dynamic local and network conditions, they are vulnerable to local and remote security attacks. In real applications, different kinds of data protection are required by various local contexts. To provide appropriate protection, we propose a multidimensional context (MContext) scheme to comprehensively model and characterize the scene and activity of mobile users. Further, based on the scheme and RBAC, we also develop a novel access control system. Our experimental results indicate that it achieves promising performance comparing to traditional RBAC (Role-based Access Control).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A Temporal Role-based Access Control Model. ACM Transactions on Information and System Security 4(3), 191–233 (2001)

    Article  Google Scholar 

  2. Joshi, J.B.D., Bertino, E., Ghafoor, A.: Temporal Hierarchies and Inheritance Semantics for GTRBAC. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 74–83 (2002)

    Google Scholar 

  3. Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: Geo-rbac: A spatially aware rbac. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pp. 29–37. ACM (2005)

    Google Scholar 

  4. Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: Geo-rbac: A Spatially Aware RBAC. ACM Transactions on Information and System Security 10(1) (2007)

    Google Scholar 

  5. Ray, I., Kumar, M., Yu, L.: LRBAC: A Location-aware Role-based Access Control Model. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 147–161. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Bauer, L., Cranor, L.F., Reiter, M.K., Vaniea, K.: Lessons Learned from the Deployment of a Smartphone-based Access-Control System. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 64–75 (2007)

    Google Scholar 

  7. Aich, S., Sural, S., Majumdar, A.: STARBAC: Spatio tempor al Role Based Access Control. In: Meersman, R. (ed.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1567–1582. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Cooper, G., Herskovits, E.: A Bayesian Method for the Induction of Proba-bilistic Networks from Data. Machine Learning 9, 309–347 (1992)

    MATH  Google Scholar 

  9. Xu, C., Li, S., Liu, G., Zhang, Y.: Crowd++: Unsupervised Speaker Count with Smartphones. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 43–52 (2013)

    Google Scholar 

  10. Cheveigne, A.D., Kawahara, H.: YIN, a Fundamental Frequency Estimator for Speech and Music. The Journal of the Acoustical Society of America 111(4), 1917–1930 (2002)

    Article  Google Scholar 

  11. Ferraiolo, D.F., Sandhu, R., Gavrila, S.: Proposed NIST Standard for Role-based Access Control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)

    Article  Google Scholar 

  12. Platt, J.: Sequetial minimal optimization: A Fast Algorithm for Training Support Vector Machines, Technical Report MST-TR-98-14, Microsoft Research (1998)

    Google Scholar 

  13. Langley, P., Iba, W., Thompson, K.: An Analysis of Bayesian Classifiers. In: The Tenth National Conference on Artificial Intelligence, pp. 223–228. AAAI Press and MIT Press (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wei, Z., Deng, R.H., Shen, J., Zhu, J., Ouyang, K., Wu, Y. (2015). Multidimensional Context Awareness in Mobile Devices. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds) MultiMedia Modeling. MMM 2015. Lecture Notes in Computer Science, vol 8936. Springer, Cham. https://doi.org/10.1007/978-3-319-14442-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14442-9_4

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14441-2

  • Online ISBN: 978-3-319-14442-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics