Skip to main content

Part of the book series: The International Series in Engineering and Computer Science ((SECS,volume 780))

Abstract

Having considered adaptation and usability as two major challenges for security in pervasive computing, this paper presents an architecture and protocol to address the associated challenges. The major challenges specified are resource modeling, context-awareness, adaptive control and dynamic interaction. With an operation-centric approach, a dual-controller architecture is presented and a coordination protocol specified.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Barwise and J. Perry. Situations and Attitudes. MIT Press, Cambridge, MA, 1983.

    Google Scholar 

  2. M. J. Covington, P. Fogla, Z. Zhan, and M. Ahamad. A Context-aware Security Architecture for Emerging Applications. In Annual Computer Security Applications Conference (ACSAC), 2002.

    Google Scholar 

  3. Anind K. Dey. Understanding and Using Context. Personal and Ubiquitous Computing Journal, 5(l):4–7, 2001.

    Article  Google Scholar 

  4. D. Hutter, W. Stephan, and M. Ullmann. Security and Privacy in Pervasive Computing: State of the Art and Future Directions. In First International Conference on Security in Pervasive Computing. Springer, 2003.

    Google Scholar 

  5. Tim Kindberg, Kan Zhang, and Narendar Shankar. Context authentication using constrained channels. In WMCSA, 2002.

    Google Scholar 

  6. Patrick McDaniel. On context in authorization policy. In 8th ACM symposium on Access control models and technologies, 2003.

    Google Scholar 

  7. Ghita Kouadri Mostfaoui and Patrick Brzillon. A Generic Framework for Context-Based Distributed Authorizations, 2003.

    Google Scholar 

  8. Brian Noble and Mark Corner. The case for transient authentication. In 10th ACM SIGOPS European Workshop, 2002.

    Google Scholar 

  9. Johannes Petersen. Modelling Control Situations for the Design of Context Sensitive Human-Machine Systems. In 21st conference on Human Decision Making and Control, 2002.

    Google Scholar 

  10. William T. Powers. A Brief Introduction to Perceptual Control Theory. Copyright 2003 William T. Powers.

    Google Scholar 

  11. Philip Robinson and Michael Beigl. Trust Context Spaces: An Infrastructure for Pervasive Security. In First International Conference on Security in Pervasive Computing. Springer Verlag Press, 2003.

    Google Scholar 

  12. David Scott, Alastair Beresford, and Alan Mycroft. Spatial Policies for Sentient Mobile Applications. In The 4th International Workshop on Policies for Distributed Systems and Networks, pages 147–157. IEEE Policy, 2003.

    Google Scholar 

  13. Gyula Simon, Tarns Kovcshzy, and Gbor Pceli. Transient Management in Reconfigurable Control Systems. Technical report, Budapest University of Technology and Economics, 2002.

    Google Scholar 

  14. M. S. Sloman. Policy driven management for distributed systems. Journal of Network and Systems Management, 2(4):333–360, 1994.

    Article  Google Scholar 

  15. F. Stajano. The Resurrecting Duckling — what next? In The 8th International Workshop on Security Protocols, April 2000.

    Google Scholar 

  16. Erkan Tin and Varol Akman. Computational Situation Theory. SIGART Bulletin, 5(4):4–17, 1994.

    Google Scholar 

  17. Albert van Breemen and Theo de Vries. An Agent-Based Framework for Designing Multi-Controller Systems. In Fifth International Conference on The Practical Applications of Intelligent Agents and Multi-Agent Technology, 2000.

    Google Scholar 

  18. X. H. Wang, D. Q. Zhang, T. Gu, and H. K. Pung. Ontology based context modeling and reasoning using OWL. In Workshop on Context Modeling and Reasoning at 2nd IEEE International PerCom, 2004.

    Google Scholar 

  19. Ka-Ping Yee. User Interaction Design for Secure Systems. Technical Report CSD-02-1184, University of California Berkeley, May 2002.

    Google Scholar 

  20. Guangsen Zhang and Manish Parashar. Context-aware Dynamic Access Control for Pervasive Applications. In Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2004.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

Robinson, P. (2005). Architecture and Protocol for Authorized Transient Control. In: Robinson, P., Vogt, H., Wagealla, W. (eds) Privacy, Security and Trust within the Context of Pervasive Computing. The International Series in Engineering and Computer Science, vol 780. Springer, Boston, MA. https://doi.org/10.1007/0-387-23462-4_13

Download citation

  • DOI: https://doi.org/10.1007/0-387-23462-4_13

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-23461-8

  • Online ISBN: 978-0-387-23462-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics