Dynamic Device Configuration in Ubiquitous Environments
The need of devices in crisis management to be configured dynamically by detecting device characteristics i.e. polices defined by the user or organization, contextual information relevant to a given scenario etc is of paramount importance. Where such information can either be already predefined or the user is allowed to define such information via automatically generated input User Interface (UI) associated to one or more extensible markup languages. Hence, the layout of the devices and behavior will be automatically configured based on policy settings and contextual information in a dynamic manner as such information changes. We present a method that allows dynamic configuration of devices that improves information systems flexibility via realizing dynamic configuration of components and enhancing management and functionality of such devices and security issues within the environment. Moreover, as this method will provide an instant configuration of devices at runtime, the components can provide and be used with uninterrupted running ability.
KeywordsDynamic Policy specification Identity Management Crisis Management
Unable to display preview. Download preview PDF.
- 2.Judith, G., Franz, S.: Information System Flexibility and the Performance of Business Processes. Journal of the Association for Information Systems (JAIS), 1–43 (2005)Google Scholar
- 3.Lu, L., Zongyong, L., Ruibo, L.: Improving Information System Flexibility through Remote Dynamic Component Configuration. In: 2006 International Conference on Service Systems and Service Management 2006 (2006)Google Scholar
- 4.Lee, J.-J., Huang, C.-Y., Lee, L.-Y., Lei, C.-L.: Design and implementation of secure communication channels over UPnP networks. In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), pp. 307–312 (2007)Google Scholar
- 5.OSGi: The OSGi Service Platform - Dynamic services for networked devices (2008), www.osgi.org (cited 2005)
- 6.Lee, J.-J., et al.: Design and implementation of secure communication channels over UPnP networks, Institute of Electrical and Electronics Engineers Computer Society, Piscataway, NJ 08855-1331, United States, Seoul, South Korea (2007)Google Scholar
- 7.DLNA: DLNA Overview and Vision Whitepaper (2006), http://www.dlna.org/en/industry/about/dlna_white_paper_2006.pdf (cited 2008)
- 8.HAVi: The HAVi Specification (2004), http://www.havi.org/HAVi_1.1.pdf (cited 2006)
- 9.ePerSpace: Towards the era of personal services at home and everywhere (2005), http://www.ist-eperspace.org/ (cited 2005)
- 11.Mol, J.J.D., et al.: Free-riding, fairness, and firewalls in P2P file-sharing. IEEE, Piscataway (2008)Google Scholar
- 13.Abdullahi, A., Qi, S., Madjid, M.: Situation Awareness in Systems of Systems Ad-hoc Environments. In: Proceedings 5th International Conference Global Security, Safety, and Sustainability, ICGS3 2009, London, UK, September 1-2, vol. 45, pp. 27–34. Springer, Heidelberg (2009)Google Scholar
- 15.Benjamin, A., Geoff, H.: Detecting Man-in-the-Middle Attacks by Precise Timing. In: Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, pp. 81–86 (2009)Google Scholar
- 16.Bo, Z., Abdullahi, A., Oliver, D., David, L.-J., Madjid, M., Qi, S., Adrian, W., Rachel, C., Glyn, J., Arnold, K.L.Y.: Data Flow Security Analysis for System-of-Systems in a Public Security Incident. In: The 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008), Liverpool, UK (2008)Google Scholar