Book ChapterDOI
Evaluating confidence in context for context-aware security
Marc Lacoste,Gilles Privat,Fano Ramparany +2 more
- pp 211-229
Reads0
Chats0
TLDR
A software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or precision, defined according to a generic context confidence ontology is proposed.Abstract:
We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or precision, defined according to a generic context confidence ontology. These metadata are processed through the network of federated distributed software services that support the acquisition, aggregation/fusion and interpretation of context, up to its exploitation by context-aware applications. This solution for qualifying and gauging context data makes possible its use in more critical applications of context awareness, such as adaptation of security mechanisms. We show how to implement with our framework a quality-critical application like contextual adaptation of security services, where security is tailored to the protection requirements of the current situation as captured by relevant context data.read more
Citations
More filters
Proceedings ArticleDOI
Think: View-Based Support of Non-functional Properties in Embedded Systems
Matthieu Anne,Ruan He,Tahar Jarboui,Marc Lacoste,Olivier Lobry,Guirec Lorant,Maxime Louvel,Juan Navas,Vincent Olive,Juraj Polakovic,Marc Poulhiès,Jacques Pulou,Stéphane Seyvoz,Julien Tous,Thomas Watteyne +14 more
TL;DR: This work shows how to extend a component model like FRACTAL with relevant abstractions such as threads, protection rings, or security domains with relevant Abstractions, and results show that THINK provides a generic and efficient approach to fully support these extensions.
Proceedings ArticleDOI
Putting together QoS and security in autonomic pervasive systems
TL;DR: An adaptation model based on selection of component compositions enabling to capture dynamic and fine-grained trade-offs between both QoS and security in pervasive systems is presented.
Proceedings ArticleDOI
Applying component-based design to self-protection of ubiquitous systems
Ruan He,Marc Lacoste +1 more
TL;DR: An integrated solution for self-protected pervasive systems in terms of a 3-level architecture containing two control loops at the network and node levels is proposed, and some preliminary results concerning an end-to-end framework based on this architecture, and its corresponding implementation are presented.
Proceedings ArticleDOI
A QoS and Security Adaptation Model for Autonomic Pervasive Systems
Mourad Alia,M. Lacoste +1 more
TL;DR: This paper presents a general adaptivity model that reconciles two conflicting concerns related to standard QoS or to security, formalized as a component composition selection process, where the best composition is found by reasoning on security and non-security properties of the system.
Journal ArticleDOI
A conceptual model of security context
TL;DR: A conceptual model of security context is proposed which represents the security context through a set of concepts at the appropriate level of abstraction and promises to facilitate the specification and management of security policies containing contextual information as well.
References
More filters
OWL Web ontology language overview
TL;DR: This document provides an introduction to OWL by informally describing the features of each of the sublanguages of OWL, the Web Ontology Language by providing additional vocabulary along with a formal semantics.
Journal ArticleDOI
A survey of trust and reputation systems for online service provision
TL;DR: Trust and reputation systems represent a significant trend in decision support for Internet mediated service provision as mentioned in this paper, where the basic idea is to let parties rate each other, for example after the completion of a transaction, and use the aggregated ratings about a given party to derive a trust or reputation score.
Proceedings ArticleDOI
Decentralized trust management
TL;DR: This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships, and describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services.
ReportDOI
Secure Computer System: Unified Exposition and Multics Interpretation
TL;DR: A suggestive interpretation of the model in the context of Multics and a discussion of several other important topics (such as communications paths, sabotage and integrity) conclude the report.
Book
Building Large Knowledge-Based Systems: Representation and Inference in the Cyc Project
TL;DR: This review has been difficult for me to write, because my thoughts about Cyc have changed a great deal since I first read the book in the spring of 1990 and I agree with his complaints about the confusing organization of the book and the lack of precise definitions.