Advertisement

A Security Framework for Smart Ubiquitous Industrial Resources

  • A. Naumenko
  • A. Katasonov
  • V. Terziyan

Abstract

Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distributed, self-managing, collaborative, international, nomadic, and ubiquitous. We are currently working on a middleware platform focused on the industrial needs, UBIWARE. UBIWARE integrates Ubiquitous Computing with Semantic Web, Distributed AI, Security and Privacy, and Enterprise Application Integration. In this paper, we describe our long-term vision for the security and privacy management in complex multi-agent systems like UBIWARE, SURPAS. The security infrastructure has to become pervasive, interoperable and intelligent enough to naturally fit UBIWARE. SURPAS aims at policy-based optimal collecting, composing, configuring and provisioning of security measures. Particularly, we analyze the security implications of UBIWARE, present the SURPAS research framework, and the SURPAS abstract architecture.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

8 References

  1. [1]
    O. Kephart and D. M. Chess, (2003) The vision of autonomic computing, Computer, vol. 36, no. 1, pp. 41–50.Google Scholar
  2. [2]
    Jennings, N.R. (2001) An agent-based approach for building complex software systems. Communications of the ACM 44(4): 35–41CrossRefGoogle Scholar
  3. [3]
    Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., and Mylopoulos, J. (2004) Tropos: An agent-oriented software development methodology. Autonomous Agents and Multi-Agent Systems 8(3): 203–236CrossRefGoogle Scholar
  4. [4]
    Berners-Lee, T., Hendler, J., and Lassila, O. (2001) The Semantic Web, Scientific American, Vol. 284, No. 5, pp. 34–43.Google Scholar
  5. [5]
    Terziyan V., Katasonov A., Global Understanding Environment: Applying Semantic Web to Industrial Automation, In: J. Cardoso, M. Hepp, M. Lytras (eds.), Real-world Applications of Semantic Web Technology and Ontologies, Springer, 2007 (in press).Google Scholar
  6. [6]
    Kaykova O., Khriyenko O., Kovtun D., Naumenko A., Terziyan V., Zharko A., (2005) General Adaption Framework: Enabling Interoperability for Industrial Web Resources, Int. Journal on Semantic Web and Information Systems, Idea Group, Vol. 1, No. 3, pp.31–63.Google Scholar
  7. [7]
    Colin G. Harrison, David M. Chess, and Aaron Kershenbaum, Mobile Agents: Are they a good idea?, technical report, 1995, IBM Research Division.Google Scholar
  8. [8]
    P. Horn, (2001) Autonomic computing: IBM’s perspective on the state of information technology, IBM Corporation, Tech. Rep., 15 Oct. 2001. Available: http://www.research.ibm.com/autonomic/manifesto/autonomic_computing.pdfGoogle Scholar
  9. [9]
    Jansen, W., (2000) Countermeasures for Mobile Agent Security, Computer Communications, Special Issue on Advanced Security Techniques for Network Protection, Elsevier Science BV.Google Scholar
  10. [10]
    Jansen, W., and Karygiannis, T., (1999) Mobile Agent Security, National Institute of Standards and Technology, Special Publication 800-19, August 1999.Google Scholar
  11. [11]
    Borselius, N., (2002) Mobile agent security, Electronics & Communication Engineering Journal, Volume 14, no 5, IEE, London, UK, pp 211–218.Google Scholar
  12. [12]
    Naumenko, A. and Luostarinen, K., (2006). Access Control Policies in (Semantic) Service-Oriented Architecture, In Semantic Systems From Visions to Applications, Proc. of the SEMANTICS 2006, OCG, Vienna, Austria, pages 49–62.Google Scholar
  13. [13]
    Satish N. Srirama and Anton Naumenko, (2007) Secure Communication and Access Control for Mobile Web Service Provisioning, (work in progress)Google Scholar
  14. [14]
    Luostarinen, K., Naumenko, A., Pulkkinen, M., (2006), Identity and Access Management for Remote Maintenance Services in Business Networks, in IFIP International Federation for Information Processing, Volume 226, Project E-Society: Building Bricks, Springer, Boston, pp. 1–12.Google Scholar
  15. [15]
    Naumenko, A., (2006) Contextual rules-based access control model with trust, In Shoniregan C. A. and Logvynovskiy A. (Eds.), Proceedings of the International Conference for Internet Technology and Secured Transactions, ICITST 2006, ISBN 0-9546628-2-2, e-Centre for Infonomics, pages 68–75.Google Scholar

Copyright information

© Springer-Verlag London Limited 2007

Authors and Affiliations

  • A. Naumenko
    • 1
  • A. Katasonov
    • 1
  • V. Terziyan
    • 1
  1. 1.Department of Mathematical Information TechnologyUniversity of JyväskyläFinland

Personalised recommendations