TY - JOUR
T1 - An Ontology for Enforcing Security and Privacy Policies on Mobile Devices
AU - Krupp, Brian
AU - Sridhar, Nigamanth
AU - Zhao, Wenbing
N1 - B. Krupp, N. Sridhar and W. Zhao, "An ontology for enforcing security and privacy policies on mobile devices," in Proceedings of the International Conference on Knowledge Engineering and Ontology Development (IC3K 2014), pp. 288-295.
PY - 2014/1/1
Y1 - 2014/1/1
N2 - Mobile devices have experienced explosive growth and rapid adoption. These devices have also become troves of security and privacy data of the consumers that utilize them. What makes mobile devices unique from traditional computing platforms is the additional sensing components they contain and their ease of access which allow consumers to make these devices a part of their lives. Additionally these devices are fragmented in operating systems, sensing capabilities, and device manufacturers. In this paper we define an ontology that can be utilized as a foundation for enforcing security and privacy policies across all mobile devices, and use the ontology to define policies and to model knowledge elements for mobile devices. We also identify areas where the policies can be applied, including whether to enforce policies on the device or in the cloud.
AB - Mobile devices have experienced explosive growth and rapid adoption. These devices have also become troves of security and privacy data of the consumers that utilize them. What makes mobile devices unique from traditional computing platforms is the additional sensing components they contain and their ease of access which allow consumers to make these devices a part of their lives. Additionally these devices are fragmented in operating systems, sensing capabilities, and device manufacturers. In this paper we define an ontology that can be utilized as a foundation for enforcing security and privacy policies across all mobile devices, and use the ontology to define policies and to model knowledge elements for mobile devices. We also identify areas where the policies can be applied, including whether to enforce policies on the device or in the cloud.
KW - Mobile Devices
KW - Security and Privacy
KW - Ontologies
UR - https://engagedscholarship.csuohio.edu/enece_facpub/374
UR - https://www.semanticscholar.org/paper/An-Ontology-for-Enforcing-Security-and-Privacy-Krupp-Sridhar/a24c8f07b3fbbfb278b232f7afa2085cba66fdc3
U2 - 10.5220/0005081502880295
DO - 10.5220/0005081502880295
M3 - Article
JO - Proceedings of the International Conference on Knowledge Engineering and Ontology Development (IC3K 2014)
JF - Proceedings of the International Conference on Knowledge Engineering and Ontology Development (IC3K 2014)
ER -