scispace - formally typeset
Book ChapterDOI

Evaluating confidence in context for context-aware security

Reads0
Chats0
TLDR
A software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or precision, defined according to a generic context confidence ontology is proposed.
Abstract
We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or precision, defined according to a generic context confidence ontology. These metadata are processed through the network of federated distributed software services that support the acquisition, aggregation/fusion and interpretation of context, up to its exploitation by context-aware applications. This solution for qualifying and gauging context data makes possible its use in more critical applications of context awareness, such as adaptation of security mechanisms. We show how to implement with our framework a quality-critical application like contextual adaptation of security services, where security is tailored to the protection requirements of the current situation as captured by relevant context data.

read more

Citations
More filters
Proceedings ArticleDOI

Think: View-Based Support of Non-functional Properties in Embedded Systems

TL;DR: This work shows how to extend a component model like FRACTAL with relevant abstractions such as threads, protection rings, or security domains with relevant Abstractions, and results show that THINK provides a generic and efficient approach to fully support these extensions.
Proceedings ArticleDOI

Putting together QoS and security in autonomic pervasive systems

TL;DR: An adaptation model based on selection of component compositions enabling to capture dynamic and fine-grained trade-offs between both QoS and security in pervasive systems is presented.
Proceedings ArticleDOI

Applying component-based design to self-protection of ubiquitous systems

TL;DR: An integrated solution for self-protected pervasive systems in terms of a 3-level architecture containing two control loops at the network and node levels is proposed, and some preliminary results concerning an end-to-end framework based on this architecture, and its corresponding implementation are presented.
Proceedings ArticleDOI

A QoS and Security Adaptation Model for Autonomic Pervasive Systems

Mourad Alia, +1 more
TL;DR: This paper presents a general adaptivity model that reconciles two conflicting concerns related to standard QoS or to security, formalized as a component composition selection process, where the best composition is found by reasoning on security and non-security properties of the system.
Journal ArticleDOI

A conceptual model of security context

TL;DR: A conceptual model of security context is proposed which represents the security context through a set of concepts at the appropriate level of abstraction and promises to facilitate the specification and management of security policies containing contextual information as well.
References
More filters

OWL Web ontology language overview

TL;DR: This document provides an introduction to OWL by informally describing the features of each of the sublanguages of OWL, the Web Ontology Language by providing additional vocabulary along with a formal semantics.
Journal ArticleDOI

A survey of trust and reputation systems for online service provision

TL;DR: Trust and reputation systems represent a significant trend in decision support for Internet mediated service provision as mentioned in this paper, where the basic idea is to let parties rate each other, for example after the completion of a transaction, and use the aggregated ratings about a given party to derive a trust or reputation score.
Proceedings ArticleDOI

Decentralized trust management

TL;DR: This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships, and describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services.
ReportDOI

Secure Computer System: Unified Exposition and Multics Interpretation

TL;DR: A suggestive interpretation of the model in the context of Multics and a discussion of several other important topics (such as communications paths, sabotage and integrity) conclude the report.
Book

Building Large Knowledge-Based Systems: Representation and Inference in the Cyc Project

TL;DR: This review has been difficult for me to write, because my thoughts about Cyc have changed a great deal since I first read the book in the spring of 1990 and I agree with his complaints about the confusing organization of the book and the lack of precise definitions.
Related Papers (5)
Trending Questions (1)
How to Clear Spring security context?

This solution for qualifying and gauging context data makes possible its use in more critical applications of context awareness, such as adaptation of security mechanisms.