Advertisement

Secure Data Flow in a Calculus for Context Awareness

  • Doina Bucur
  • Mogens Nielsen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5065)

Abstract

We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computing agents can provide and discover contextual information and are owners of security policies. Simple access control to contextual information is not sufficient to insure confidentiality in Global Computing, therefore our security policies regulate agents’ rights to the provision and discovery of contextual information over distributed flows of actions. A type system enforcing security policies by a combination of static and dynamic checking of mobile agents is provided, together with its type soundness.

Keywords

Ubiquitous Computing Mobile Ambients context awareness security type system 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol. 1707, pp. 304–307. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  2. 2.
    Bardram, J.E., Hansen, T.R.: The AWARE architecture: supporting context-mediated social awareness in mobile cooperation. In: CSCW 2004: Proceedings of the 2004 ACM conference on Computer supported cooperative work, pp. 192–201. ACM Press, New York (2004)CrossRefGoogle Scholar
  3. 3.
    Birkedal, L., Debois, S., Elsborg, E., Hildebrandt, T., Niss, H.: Bigraphical models of context-aware systems. In: Aceto, L., Ingólfsdóttir, A. (eds.) FOSSACS 2006. LNCS, vol. 3921. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Boudol, G.: On typing information flow. In: Van Hung, D., Wirsing, M. (eds.) ICTAC 2005. LNCS, vol. 3722, pp. 366–380. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Braione, P.: Operational congruences for contextual reactive systems. Technical Report, 33, DEI, Politecnico di Milano (2004)Google Scholar
  6. 6.
    Bucur, D., Bardram, J.E.: Resource discovery in activity-based sensor networks. Mobile Networks and Applications (MONET) 12(2-3), 129–142 (2007)CrossRefGoogle Scholar
  7. 7.
    Bugliesi, M., Castagna, G., Crafa, S.: Boxed ambients. In: Kobayashi, N., Pierce, B.C. (eds.) TACS 2001. LNCS, vol. 2215, pp. 38–63. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  8. 8.
    Bugliesi, M., Castagna, G., Crafa, S.: Reasoning about security in mobile ambients. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001. LNCS, vol. 2154, pp. 102–120. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. 9.
    Cardelli, L., Ghelli, G., Gordon, A.D.: Types for the ambient calculus. Inf. Comput. 177(2), 160–194 (2002)zbMATHMathSciNetGoogle Scholar
  10. 10.
    Cardelli, L., Gordon, A.D.: Mobile ambients. In: Nivat, M. (ed.) FOSSACS 1998. LNCS, vol. 1378, Springer, Heidelberg (1998)CrossRefGoogle Scholar
  11. 11.
    Chen, G., Kotz, D.: A Survey of Context-Aware Mobile Computing Research. Dartmouth Computer Science Technical Report TR2000-381 (2000)Google Scholar
  12. 12.
    Cheverst, K., Davies, N., Mitchell, K., Friday, A.: The role of connectivity in supporting context-sensitive applications. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol. 1707, pp. 193–207. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  13. 13.
    Coppo, M., Dezani-Ciancaglini, M., Giovannetti, E., Salvo, I.: Mobility types for mobile processes in mobile ambients. Electronic Notes in Theoretical Computer Science 78 (2002)Google Scholar
  14. 14.
    Gorla, D., Hennessy, M., Sassone, V.: Security policies as membranes in systems for global computing. Logical Methods in Computer Science 1(1:3), 1–23 (2005)MathSciNetGoogle Scholar
  15. 15.
    Gorla, D., Pugliese, R.: Enforcing security policies via types. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 86–100. Springer, Heidelberg (2004)Google Scholar
  16. 16.
    Julien, C., Payton, J., Roman, G.-C.: Reasoning about context-awareness in the presence of mobility. Electr. Notes Theor. Comput. Sci. 97, 259–276 (2004)CrossRefGoogle Scholar
  17. 17.
    Kjærgaard, M.B., Bunde-Pedersen, J.: Towards a formal model of context awareness. In: First International Workshop on Combining Theory and Systems Building in Pervasive Computing 2006 (CTSB 2006) (2006)Google Scholar
  18. 18.
    Roman, G.C., Julien, C., Payton, J.: A formal treatment of context-awareness. In: Wermelinger, M., Margaria-Steffen, T. (eds.) FASE 2004. LNCS, vol. 2984, pp. 12–36. Springer, Heidelberg (2004)Google Scholar
  19. 19.
    Schilit, B., Adams, N., Want, R.: Context-aware computing applications. In: IEEE Workshop on Mobile Computing Systems and Applications (1994)Google Scholar
  20. 20.
    Schilit, B.N.: A System Architecture for Context-Aware Mobile Computing. PhD thesis (1995)Google Scholar
  21. 21.
    Want, R., Hopper, A., Falcão, V., Gibbons, J.: The active badge location system. Technical Report 92.1, Olivetti Research Ltd. (ORL) (1992)Google Scholar
  22. 22.
    Zimmer, P.: A calculus for context-awareness. Technical Report BRICS Report Series RS-05-27Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Doina Bucur
    • 1
  • Mogens Nielsen
    • 1
  1. 1.BRICS, Department of Computer ScienceUniversity of AarhusDenmark

Personalised recommendations