Advertisement

Dynamic Device Configuration in Ubiquitous Environments

  • Abdullahi Arabo
  • Qi Shi
  • Madjid Merabti
Part of the Communications in Computer and Information Science book series (CCIS, volume 92)

Abstract

The need of devices in crisis management to be configured dynamically by detecting device characteristics i.e. polices defined by the user or organization, contextual information relevant to a given scenario etc is of paramount importance. Where such information can either be already predefined or the user is allowed to define such information via automatically generated input User Interface (UI) associated to one or more extensible markup languages. Hence, the layout of the devices and behavior will be automatically configured based on policy settings and contextual information in a dynamic manner as such information changes. We present a method that allows dynamic configuration of devices that improves information systems flexibility via realizing dynamic configuration of components and enhancing management and functionality of such devices and security issues within the environment. Moreover, as this method will provide an instant configuration of devices at runtime, the components can provide and be used with uninterrupted running ability.

Keywords

Dynamic Policy specification Identity Management Crisis Management 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Weiser, M.: The computer for the 21st century. ACM SIGMOBILE Mobile Computing and Communications Review 3(3), 3–11 (1999)CrossRefGoogle Scholar
  2. 2.
    Judith, G., Franz, S.: Information System Flexibility and the Performance of Business Processes. Journal of the Association for Information Systems (JAIS), 1–43 (2005)Google Scholar
  3. 3.
    Lu, L., Zongyong, L., Ruibo, L.: Improving Information System Flexibility through Remote Dynamic Component Configuration. In: 2006 International Conference on Service Systems and Service Management 2006 (2006)Google Scholar
  4. 4.
    Lee, J.-J., Huang, C.-Y., Lee, L.-Y., Lei, C.-L.: Design and implementation of secure communication channels over UPnP networks. In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), pp. 307–312 (2007)Google Scholar
  5. 5.
    OSGi: The OSGi Service Platform - Dynamic services for networked devices (2008), www.osgi.org (cited 2005)
  6. 6.
    Lee, J.-J., et al.: Design and implementation of secure communication channels over UPnP networks, Institute of Electrical and Electronics Engineers Computer Society, Piscataway, NJ 08855-1331, United States, Seoul, South Korea (2007)Google Scholar
  7. 7.
    DLNA: DLNA Overview and Vision Whitepaper (2006), http://www.dlna.org/en/industry/about/dlna_white_paper_2006.pdf (cited 2008)
  8. 8.
    HAVi: The HAVi Specification (2004), http://www.havi.org/HAVi_1.1.pdf (cited 2006)
  9. 9.
    ePerSpace: Towards the era of personal services at home and everywhere (2005), http://www.ist-eperspace.org/ (cited 2005)
  10. 10.
    Merabti, M., et al.: Managing Distributed Networked Appliances in Home Networks. Proceedings of the IEEE 96(1), 166–185 (2008)CrossRefGoogle Scholar
  11. 11.
    Mol, J.J.D., et al.: Free-riding, fairness, and firewalls in P2P file-sharing. IEEE, Piscataway (2008)Google Scholar
  12. 12.
    Li, J.: On peer-to-peer (P2P) content delivery. Peer-to-Peer Networking and Applications 1(1), 45–63 (2008)CrossRefGoogle Scholar
  13. 13.
    Abdullahi, A., Qi, S., Madjid, M.: Situation Awareness in Systems of Systems Ad-hoc Environments. In: Proceedings 5th International Conference Global Security, Safety, and Sustainability, ICGS3 2009, London, UK, September 1-2, vol. 45, pp. 27–34. Springer, Heidelberg (2009)Google Scholar
  14. 14.
    Haifeng, Y., Michael, K., Gibbons, P.B., Flaxman, A.D.: SybilGuard: Defending Against Sybil Attacks via Social Networks. IEEE/ACM Transactions on Networking 16(3), 576–589 (2008)CrossRefGoogle Scholar
  15. 15.
    Benjamin, A., Geoff, H.: Detecting Man-in-the-Middle Attacks by Precise Timing. In: Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, pp. 81–86 (2009)Google Scholar
  16. 16.
    Bo, Z., Abdullahi, A., Oliver, D., David, L.-J., Madjid, M., Qi, S., Adrian, W., Rachel, C., Glyn, J., Arnold, K.L.Y.: Data Flow Security Analysis for System-of-Systems in a Public Security Incident. In: The 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008), Liverpool, UK (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Abdullahi Arabo
    • 1
  • Qi Shi
    • 1
  • Madjid Merabti
    • 1
  1. 1.Distributed Multimedia Systems and Security (DMSS) Group, School of Computing & Mathematical SciencesLiverpool John Moores UniversityUK

Personalised recommendations