Information exposure control through data manipulation for ubiquitous computing
read more
Citations
Autonomic system for mobility support in 4G networks
Alignment of organizational security policies: Theory and Practice
Representing humans in system security models: An actor-network approach
Privacy in Pervasive Computing and Open Issues
Query Issues in Continuous Reporting Systems
References
The computer for the 21st century
A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications
The anatomy of a context-aware application
The Ponder Policy Specification Language
Virtual network computing
Related Papers (5)
Frequently Asked Questions (15)
Q2. How can collaboration groups be formed among ubiquitous units?
Collaboration groups, based on trust [18], can be formed among such sets of units for aided context awareness or simply increased confidence.
Q3. How can a unit be used to improve its context awareness?
In infrastructure-rich environments, dedicated, high-confidence, context awareness services can be used, by joining a unit’s collaboration group.
Q4. What is the prominent effort to extend an access control mechanism with context awareness?
Generalized Role Based Access Control (GRBAC) [5] represents the most prominent effort to extend an access control mechanism with context awareness.
Q5. How can a ubiquitous unit be used to determine the presence of a user?
A ubiquitous unit is defined as any computationally capable individual entity in a ubiquitous system e.g. a PDA, a mobile phone etc.
Q6. What is the purpose of the proposed model?
As stated in the introduction, the proposed model aims at aiding the users in protecting the privacy and security of their data in face of increasing technological complexities involved in an Ubiquitous Computing environment.
Q7. What is the reason for introducing the concept of the trust-based collaboration groups?
The authors realize that there will always be ”smaller” and ”weaker” devices than the minimum required and that is one of the reasons of introducing the notion of the trust-based collaboration groups.
Q8. What is the main focus of the research in the field of Ubiquitous Computing?
One of the focal points has been the recognition of the importance of the context information as the means of adapting authentication and authorization mechanisms to suit the Ubiquitous Computing requirements (e.g. [5, 18, 21, 4, 17] etc.).
Q9. How is the LoE of a data object determined?
First-level containment is determined by tracking data objects and its attributes are expected to be pre-set e.g. through a certification process.
Q10. What is the way to provide this ability in the traditional system architectures?
To provide this ability in the traditional system architectures would require a complex mechanism spanning operating system privileged layer and application layer alike to be able to link any piece of data to a specific policy at any point in time.
Q11. What is the role of the cooperating user scenario?
The cooperating user scenario puts us in the position to seek user feedback in situations of insufficient context information or ambiguity.
Q12. What is the focus of the research in the field of Ubiquitous systems security?
Past research in the field of Ubiquitous systems security has focused mostly on adapting the existing security models and mechanisms to the new environment.
Q13. What is the main aim of the proposed approach?
As the work is still in its very infancy, the proposed approach is presented on a high-level with the main aim being exposing the idea and motivation and identifying the issues present at this stage.
Q14. What is the main difference between the proposed model and the traditional system architecture?
The operation of the proposed model largely depends on the ability to continuously track data objects as they move among containers.
Q15. What is the effect of the two-level LoE model on the security?
Figure 4.3 depicts a mapping of the two-level LoE model to a lattice-based security model and the influence of container types on state attributes and their values triggering each of the exposure levels.