Fine-grained control of user attributes: The case of Bring Your Own Device (BYOD)

Henning Olesen, Samant Khajuria

Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceabstrakt i proceedingForskningpeer review

Resumé

Private users, enterprises and other stakeholders have a strong need to protect their resources when interacting with each other. For the users it is a matter of protecting vital personal information and assets (privacy protection), and for enterprises the main concern is to protect their intellectual property and confidential data, documents, etc. In this paper we focus on the employee-enterprise interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable fine-grained control of resources and new roles of interaction. The work is inspired by the current trend of Bring Your Own Device (BYOD), but is extended to deal with mutual benefits for users/employees and enterprises.
OriginalsprogEngelsk
TitelProceedings of WWRF Meeting 32, Marrakech, Morocco, May 2014
Antal sider6
Publikationsdato22 maj 2014
StatusUdgivet - 22 maj 2014
BegivenhedWireless World Research Forum Meeting on "Towards a smart fully connected society" - Marrakech, Marokko
Varighed: 20 maj 201422 maj 2014
Konferencens nummer: 32

Konference

KonferenceWireless World Research Forum Meeting on "Towards a smart fully connected society"
Nummer32
LandMarokko
ByMarrakech
Periode20/05/201422/05/2014

Emneord

  • Access control
  • personal attributes
  • privacy by design
  • protected resources
  • trust
  • User Managed Access

Citer dette

Olesen, H., & Khajuria, S. (2014). Fine-grained control of user attributes: The case of Bring Your Own Device (BYOD). I Proceedings of WWRF Meeting 32, Marrakech, Morocco, May 2014
Olesen, Henning ; Khajuria, Samant. / Fine-grained control of user attributes : The case of Bring Your Own Device (BYOD). Proceedings of WWRF Meeting 32, Marrakech, Morocco, May 2014. 2014.
@inbook{bb602c17de52472980a9fb6247e829e4,
title = "Fine-grained control of user attributes: The case of Bring Your Own Device (BYOD)",
abstract = "Private users, enterprises and other stakeholders have a strong need to protect their resources when interacting with each other. For the users it is a matter of protecting vital personal information and assets (privacy protection), and for enterprises the main concern is to protect their intellectual property and confidential data, documents, etc. In this paper we focus on the employee-enterprise interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable fine-grained control of resources and new roles of interaction. The work is inspired by the current trend of Bring Your Own Device (BYOD), but is extended to deal with mutual benefits for users/employees and enterprises.",
keywords = "Access control, personal attributes, privacy by design, protected resources, trust, User Managed Access",
author = "Henning Olesen and Samant Khajuria",
year = "2014",
month = "5",
day = "22",
language = "English",
booktitle = "Proceedings of WWRF Meeting 32, Marrakech, Morocco, May 2014",

}

Olesen, H & Khajuria, S 2014, Fine-grained control of user attributes: The case of Bring Your Own Device (BYOD). i Proceedings of WWRF Meeting 32, Marrakech, Morocco, May 2014. Wireless World Research Forum Meeting on "Towards a smart fully connected society", Marrakech, Marokko, 20/05/2014.

Fine-grained control of user attributes : The case of Bring Your Own Device (BYOD). / Olesen, Henning; Khajuria, Samant.

Proceedings of WWRF Meeting 32, Marrakech, Morocco, May 2014. 2014.

Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceabstrakt i proceedingForskningpeer review

TY - ABST

T1 - Fine-grained control of user attributes

T2 - The case of Bring Your Own Device (BYOD)

AU - Olesen, Henning

AU - Khajuria, Samant

PY - 2014/5/22

Y1 - 2014/5/22

N2 - Private users, enterprises and other stakeholders have a strong need to protect their resources when interacting with each other. For the users it is a matter of protecting vital personal information and assets (privacy protection), and for enterprises the main concern is to protect their intellectual property and confidential data, documents, etc. In this paper we focus on the employee-enterprise interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable fine-grained control of resources and new roles of interaction. The work is inspired by the current trend of Bring Your Own Device (BYOD), but is extended to deal with mutual benefits for users/employees and enterprises.

AB - Private users, enterprises and other stakeholders have a strong need to protect their resources when interacting with each other. For the users it is a matter of protecting vital personal information and assets (privacy protection), and for enterprises the main concern is to protect their intellectual property and confidential data, documents, etc. In this paper we focus on the employee-enterprise interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable fine-grained control of resources and new roles of interaction. The work is inspired by the current trend of Bring Your Own Device (BYOD), but is extended to deal with mutual benefits for users/employees and enterprises.

KW - Access control

KW - personal attributes

KW - privacy by design

KW - protected resources

KW - trust

KW - User Managed Access

M3 - Conference abstract in proceeding

BT - Proceedings of WWRF Meeting 32, Marrakech, Morocco, May 2014

ER -

Olesen H, Khajuria S. Fine-grained control of user attributes: The case of Bring Your Own Device (BYOD). I Proceedings of WWRF Meeting 32, Marrakech, Morocco, May 2014. 2014