Access Control for PDAs

Traditional access control mechanisms focus on separating users from one another and are designed with the assumption that there is a competent systems administrator or security manager controlling who may do what. These mechanisms are inappropriate for personal digital assistants (PDAs) where there is a single user who is probably not a professional systems or security administrator. This paper examines what access control features are needed in a PDA and what assumptions are reasonable to make about its administration. It then presents an access control system to provide these features subject to the administrative constraints.

By: James Riordan

Published in: RZ3219 in 2000

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rz3219.pdf

Questions about this service can be mailed to reports@us.ibm.com .