Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith,
M., and Steggles, P. (1999). Towards a better un-
derstanding of context and context-awareness. In
Handheld and ubiquitous computing, pages 304–307.
Springer.
Adams, A. and Sasse, M. A. (1999). Users are not the en-
emy. Communications of the ACM, 42(12):40–46.
Ardagna, C. A., Di Vimercati, S. D. C., Foresti, S., Grandi-
son, T. W., Jajodia, S., and Samarati, P. (2010). Access
control for smarter healthcare using policy spaces.
Computers & Security, 29(8):848–858.
Atluri, V. and Chun, S. A. (2007). A geotemporal role-
based authorisation system. International Journal of
Information and Computer Security, 1(1-2):143–168.
Bhatti, R., Bertino, E., and Ghafoor, A. (2005). A
trust-based context-aware access control model for
web-services. Distributed and Parallel Databases,
18(1):83–105.
Brands, S. and Chaum, D. (1993). Distance-bounding pro-
tocols. In Advances in CryptologyEUROCRYPT93,
pages 344–359. Springer.
Camenisch, J. and Lysyanskaya, A. (2003). A signature
scheme with efficient protocols. In Security in com-
munication networks, pages 268–289. Springer.
Camenisch, J., Stadler, M., Camenisch, J., and Camenisch,
J. (1997). Proof systems for general statements about
discrete logarithms. Citeseer.
Camenisch, J. and Van Herreweghen, E. (2002). Design and
implementation of the idemix anonymous credential
system. In Proceedings of the 9th ACM Conference
on Computer and Communications Security. ACM.
Groopman, J. (2015). Consumer perceptions of privacy in
the internet of things. Altimeter Group.
Hayashi, E., Das, S., Amini, S., Hong, J., and Oakley, I.
(2013). Casa: Context-aware scalable authentication.
In Proceedings of the Ninth Symposium on Usable
Privacy and Security, SOUPS ’13, pages 3:1–3:10,
New York, NY, USA. ACM.
Hintze, D., Findling, R. D., Muaaz, M., Koch, E., and
Mayrhofer, R. (2015). Cormorant: Towards contin-
uous risk-aware multi-modal cross-device authentica-
tion. UbiComp/ISWC’15 Adjunct.
Housley, R., Polk, W., Ford, W., and Solo, D. (2002). In-
ternet x. 509 public key infrastructure certificate and
certificate revocation list (crl) profile.
Hu, J. and Weaver, A. C. (2004). A dynamic, context-aware
security infrastructure for distributed healthcare appli-
cations. In Proceedings of the first workshop on per-
vasive privacy security, privacy, and trust, pages 1–8.
Citeseer.
Hulsebosch, R., Salden, A., Bargh, M., Ebben, P., and Re-
itsma, J. (2005). Context sensitive access control.
In Proceedings of the tenth ACM symposium on Ac-
cess control models and technologies, pages 111–119.
ACM.
Jafarian, J. H. and Amini, M. (2015). Camac: A context-
aware mandatory access control model. The ISC In-
ternational Journal of Information Security, 1(1).
Jin, X., Krishnan, R., and Sandhu, R. S. (2012). A unified
attribute-based access control model covering dac,
mac and rbac. DBSec, 12:41–55.
Kulkarni, D. and Tripathi, A. (2008). Context-aware role-
based access control in pervasive computing systems.
In Proceedings of the 13th ACM symposium on Ac-
cess control models and technologies, pages 113–122.
ACM.
Matheus, A. and Herrmann, J. (2008). Geospatial extensi-
ble access control markup language (geoxacml). Open
Geospatial Consortium Inc. OGC.
Milutinovic, M., Dacosta, I., Put, A., and Decker, B. D.
(2015). ucentive: An efficient, anonymous and
unlinkable incentives scheme. In Trustcom/Big-
DataSE/ISPA, 2015 IEEE, volume 1, pages 588–595.
IEEE.
Paquin, C. and Zaverucha, G. (2011). U-prove crypto-
graphic specification v1. 1. Technical report, Mi-
crosoft Technical Report, http://connect. microsoft.
com/site1188.
Put, A., Dacosta, I., Milutinovic, M., and De Decker, B.
(2014). Priman: Facilitating the development of se-
cure and privacy-preserving applications. In SEC,
pages 403–416. Springer.
Ray, I. and Toahchoodee, M. (2007). A spatio-temporal
role-based access control model. In Data and Appli-
cations Security XXI, pages 211–226. Springer.
Rissanen, E. et al. (2013). extensible access control markup
language (xacml) version 3.0.
Riva, O., Qin, C., Strauss, K., and Lymberopoulos, D.
(2012). Progressive authentication: Deciding when to
authenticate on mobile phones. In USENIX Security,
pages 301–316.
Sabouri, A., Krontiris, I., and Rannenberg, K. (2012).
Attribute-based credentials for Trust (ABC4Trust).
Springer.
Shebaro, B., Oluwatimi, O., and Bertino, E. (2015).
Context-based access control systems for mobile de-
vices. Dependable and Secure Computing, IEEE
Transactions on, 12(2):150–163.
Singelee, D. and Preneel, B. (2005). Location verification
using secure distance bounding protocols. In Mobile
Adhoc and Sensor Systems Conference, 2005. IEEE
International Conference on, pages 7–pp. IEEE.
Vimercati, S. D. C. D., Foresti, S., Jajodia, S., Paraboschi,
S., Psaila, G., and Samarati, P. (2012). Integrating
trust management and access control in data-intensive
web applications. ACM Transactions on the Web
(TWEB), 6(2):6.
Yuan, E. and Tong, J. (2005). Attributed based access con-
trol (abac) for web services. In 2005 IEEE Interna-
tional Conference on Web Services. IEEE.
SECRYPT 2016 - International Conference on Security and Cryptography
170