A Security Framework for Smart Ubiquitous Industrial Resources
Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distributed, self-managing, collaborative, international, nomadic, and ubiquitous. We are currently working on a middleware platform focused on the industrial needs, UBIWARE. UBIWARE integrates Ubiquitous Computing with Semantic Web, Distributed AI, Security and Privacy, and Enterprise Application Integration. In this paper, we describe our long-term vision for the security and privacy management in complex multi-agent systems like UBIWARE, SURPAS. The security infrastructure has to become pervasive, interoperable and intelligent enough to naturally fit UBIWARE. SURPAS aims at policy-based optimal collecting, composing, configuring and provisioning of security measures. Particularly, we analyze the security implications of UBIWARE, present the SURPAS research framework, and the SURPAS abstract architecture.
Unable to display preview. Download preview PDF.
- O. Kephart and D. M. Chess, (2003) The vision of autonomic computing, Computer, vol. 36, no. 1, pp. 41–50.Google Scholar
- Berners-Lee, T., Hendler, J., and Lassila, O. (2001) The Semantic Web, Scientific American, Vol. 284, No. 5, pp. 34–43.Google Scholar
- Terziyan V., Katasonov A., Global Understanding Environment: Applying Semantic Web to Industrial Automation, In: J. Cardoso, M. Hepp, M. Lytras (eds.), Real-world Applications of Semantic Web Technology and Ontologies, Springer, 2007 (in press).Google Scholar
- Kaykova O., Khriyenko O., Kovtun D., Naumenko A., Terziyan V., Zharko A., (2005) General Adaption Framework: Enabling Interoperability for Industrial Web Resources, Int. Journal on Semantic Web and Information Systems, Idea Group, Vol. 1, No. 3, pp.31–63.Google Scholar
- Colin G. Harrison, David M. Chess, and Aaron Kershenbaum, Mobile Agents: Are they a good idea?, technical report, 1995, IBM Research Division.Google Scholar
- P. Horn, (2001) Autonomic computing: IBM’s perspective on the state of information technology, IBM Corporation, Tech. Rep., 15 Oct. 2001. Available: http://www.research.ibm.com/autonomic/manifesto/autonomic_computing.pdfGoogle Scholar
- Jansen, W., (2000) Countermeasures for Mobile Agent Security, Computer Communications, Special Issue on Advanced Security Techniques for Network Protection, Elsevier Science BV.Google Scholar
- Jansen, W., and Karygiannis, T., (1999) Mobile Agent Security, National Institute of Standards and Technology, Special Publication 800-19, August 1999.Google Scholar
- Borselius, N., (2002) Mobile agent security, Electronics & Communication Engineering Journal, Volume 14, no 5, IEE, London, UK, pp 211–218.Google Scholar
- Naumenko, A. and Luostarinen, K., (2006). Access Control Policies in (Semantic) Service-Oriented Architecture, In Semantic Systems From Visions to Applications, Proc. of the SEMANTICS 2006, OCG, Vienna, Austria, pages 49–62.Google Scholar
- Satish N. Srirama and Anton Naumenko, (2007) Secure Communication and Access Control for Mobile Web Service Provisioning, (work in progress)Google Scholar
- Luostarinen, K., Naumenko, A., Pulkkinen, M., (2006), Identity and Access Management for Remote Maintenance Services in Business Networks, in IFIP International Federation for Information Processing, Volume 226, Project E-Society: Building Bricks, Springer, Boston, pp. 1–12.Google Scholar
- Naumenko, A., (2006) Contextual rules-based access control model with trust, In Shoniregan C. A. and Logvynovskiy A. (Eds.), Proceedings of the International Conference for Internet Technology and Secured Transactions, ICITST 2006, ISBN 0-9546628-2-2, e-Centre for Infonomics, pages 68–75.Google Scholar