scispace - formally typeset
Open Access

Context-Adaptive Information Security for UbiComp Environments

Reads0
Chats0
TLDR
Traditional computer applications expect a static execution environment, but this assumption is no longer realistic in the Ubiquitous world scenario, where the environment around a piece of information, contained on a device or within a communications channel, is frequently changing.
Abstract
Traditional computer applications expect a static execution environment. Such environments imply nonor slowlyevolving information security and privacy threat models. This assumption is no longer realistic in the Ubiquitous world scenario, where the environment around a piece of information, contained on a device or within a communications channel, is frequently changing. Thus, the information contained in the Ubiquitous world is exposed to varying threat models throughout its lifetime. Users expect high degree of information availability anytime and anywhere as needed, leading to serious security and privacy risks and access control problems.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Autonomic system for mobility support in 4G networks

TL;DR: PRETON deploys a formal policy representation model, based on finite-state transducers, that evaluates policies using information from the context to manage mobiles' behavior in a transparent manner, hiding 4G systems' complexities.
Patent

Information Rights Management

TL;DR: In this article, an IRM server is provided which communicates with one or more policy evaluators which are independent of the IRM servers, and results from the different policy evaluateators may be combined by the server and one or multiple identity providers may be used in conjunction with each evaluator.

Seamless mobility in 4G systems

Pablo Vidales
TL;DR: This dissertation claims that minimising the latency is not enough to enable seamless roaming in highly-integrated and diverse networks, and shows the design and implementation of PROTON, a policy-based solution to assist nomadic users.
References
More filters
Journal ArticleDOI

A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications

TL;DR: A conceptual framework is presented that separates the acquisition and representation of context from the delivery and reaction to context by a context-aware application, and a toolkit is built that instantiates this conceptual framework and supports the rapid development of a rich space of context- aware applications.
Book ChapterDOI

The Ponder Policy Specification Language

TL;DR: The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java.
Journal ArticleDOI

Virtual network computing

TL;DR: The structure of the VNC protocol is described, and the ways the authors use VNC technology now and how it may evolve further as new clients and servers are developed are discussed.

The KeyNote Trust-Management System Version 2

TL;DR: This memo describes version 2 of the KeyNote trust-management system, which specifies the syntax and semantics of KeyNote `assertions', describes `action attribute' processing, and outlines the application architecture into which a KeyNote implementation can be fit.

The KeyNote trust management system version2, IETF RFC 2704

TL;DR: In this article, the authors proposed a logic circuit having a load MISFET of the depletion type, a logic block of a predetermined logic expression, and an enhancement type of the enhancement type driven by clock pluses.
Related Papers (5)