Advertisement

A Policy Description Language for Context-Based Access Control and Adaptation in Ubiquitous Environment

  • Joonseon Ahn
  • Byeong-Mo Chang
  • Kyung-Goo Doh
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4097)

Abstract

The goal of our research is to provide an advanced programming environment for ubiquitous computing, which facilitates the development of secure and reliable ubiquitous software. The environment consists of a high-level ubiquitous programming framework, a run-time system enhanced with better context adaptation and security, and programming support tools.

In this paper, we focus on a ubiquitous programming framework, which includes a high-level policy description language, a translator to Java and a runtime system. We first present a high-level policy description language for formally specifying context entity relation, as well as context-based access control and adaptation policies. We then describe how a specification in the policy description language can be translated into Java code which makes use of JCAF.

Keywords

Access Control Ubiquitous Computing Access Control Policy Runtime System Adaptation Rule 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Bardram, J.E.: The Java Context Awareness Framework-A Service Infrastructure and Programming Framework for Context-Aware Applications. In: Third International Conference, Pervasive 2005, Munich, Germany (May 2005)Google Scholar
  2. 2.
    Cahill, V., et al.: Using Trust for Secure Collaboration in Uncertain Environment, Pervasive computing, July-September 2003 pp. 52–61 (2003)Google Scholar
  3. 3.
    Cho, E., Lee, K.: Security Checks in Programming Languages for Ubiquitous Environments. In: Proceedings of 2004 Workshop on Pervasive, Security, Privacy and Trust (August 2004)Google Scholar
  4. 4.
    Bellavista, P., Corradi, A., Montanari, R.: Context-Aware Middleware for Resource Management in the Wireless Internet. IEEE Transactions on Software Engineering 29(12) (December 2003)Google Scholar
  5. 5.
    Corradi, A., Montanari, R., Tibaldi, D.: Context-based Access Control for Ubiquitous Service Provisioning. In: Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004) (2004)Google Scholar
  6. 6.
    Kindberg, T., Fox, A.: System Software for Ubiquitous Computing, Pervasive computing, January-March 2003, pp. 70–81 (2003)Google Scholar
  7. 7.
    Roman, M., Hess, C.K., Cerqueira, R., Ranganat, A., Campbell, R.H., Nahrstedt, K.: Gaia: A Middleware Infrastructure to Enable Active Spaces. In: IEEE Pervasive Computing, pp. 74–83 (2002)Google Scholar
  8. 8.
    Scott, D.J.: Abstracting application-level security policy for ubiquitous computing, University of Cambridge, Computer Laboratory, Technical Report UCAM-CL-TR-613 (January 2005)Google Scholar
  9. 9.
    Wichadakul, D., Gu, X., Nahrstedt, K.: A Programming Framework for Quality-Aware Ubiquitous Multimedia Applications. In: Proceedings of Multimedia 2002, Juan-les-Pins, France (December 2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Joonseon Ahn
    • 1
  • Byeong-Mo Chang
    • 2
  • Kyung-Goo Doh
    • 3
  1. 1.Hankuk Aviation UniversiyKoyangKorea
  2. 2.Sookmyung Women’s UniversitySeoulKorea
  3. 3.Hanyang UniversityAnsanKorea

Personalised recommendations