Abstract
Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in different domains. In the EU project Hydra high-level security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios. This paper gives a short introduction to the Hydra project and its approach to ensure security by design. Based on the results of a focus group analysis of the user domain “building automation” typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta-Model. How concepts such as context, semantic resolution of security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of a technical building automation scenario.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ernesto Damiani, Sabrina De Capitani di Vimercati, and Pierangela Samarati. New paradigms for access control in open environments. In Proc. of the 5th IEEE International Symposium on Signal Processing and Information, Dec. 2005.
S. di Vimercati, P. Samarati, and S. Jajodia. Policies, models, and languages for access control. In Proc. of the Workshop on Databases in Networked Information Systems. March 2005.
S. Dritsas, L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Kokolakis, C. Lambrinoudakis, and S. Katsikas. A knowledge-based approach to security requirements for e-health applications. Electronic Journal for E-Commerce Tools and Applications, 2006.
FAST GmbH for the European Commission. Study of worldwide trends and R&D programs in embedded systems in view of maximizing the impact of a technology platform in the area, Nov 2005.
HYDRA. Networked embedded system middleware for heterogeneous physical devices in a distributed architecture. http://www.hydra.eu.com, Jul 2007. contract number: IST-2005-03489L duration: 07/2006-06/2010.
Naval Research Lab. NRL Security Ontology, Jul 2007. http://chacs.nrl.navy.mil/projects/4SEA/ontology.html.
OASIS. eXtensible Access Control Markup Language (XACML) Version 2.0. http://www.oasis-open.org/committees/xacml, 2004.
Bill Schilit, Norman Adams, and Roy Want. Context-aware computing applications. In IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, US, 1994.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag France, Paris
About this paper
Cite this paper
Hoffmann, M. et al. (2008). Towards Semantic Resolution of Security in Ambient Environments. In: Developing Ambient Intelligence. Springer, Paris. https://doi.org/10.1007/978-2-287-78544-3_2
Download citation
DOI: https://doi.org/10.1007/978-2-287-78544-3_2
Publisher Name: Springer, Paris
Print ISBN: 978-2-287-78543-6
Online ISBN: 978-2-287-78544-3
eBook Packages: Computer ScienceComputer Science (R0)