PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Vector Approach to Context Data Reliability

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Context-aware processing is a part of intensively developed ubiquitous computing andmobile systems. Surrounding awareness is used to introduce new functions and solutions. Some categories of the context data are taken for security purposes in the context-aware security implementations.This kind of data has to meet some conditions since it is used for decision making about security mechanisms adaptation and configuration. One of these conditions is reliability. The paper presents vector approach to context data reliability assessment introducing mechanism which allows to assess reliability parameters for further usage in context aware security processing. The following aspects of the context data are taken into account: interface reliability, data quality, data source reliability and security level. Introducing reliability metric for context data may be beneficial to other mechanisms which utilize context data. The vector form of reliability may be even more flexible than the scalar value.
Rocznik
Strony
60--75
Opis fizyczny
Bibliogr. 34 poz., rys., tab.
Twórcy
autor
  • Institute of Telecommunications of WUT, Nowowiejska 15/19, 00-665 Warsaw, Poland
Bibliografia
  • [1] Want R., Hopper A., Falcao V., Gibbons J., The active badge location system, ACM Transactions on Information Systems (TOIS) (1992): 91–102.
  • [2] Schilit B. N., Theimer M. M., Disseminating active map information to mobile hosts, Network, IEEE, 8(5) (1994): 22–32.
  • [3] Abowd G. D., Dey A. K., Brown P. J., Davies N., Smith M., Steggles P., Towards a Better Understanding of Context and Context-Awareness, Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing (1999): 304–307.
  • [4] Hull R., Neaves P., Bedford-Roberts J., Towards situated computing,”Wearable Computers, 1997, Digest of Papers., First International Symposium (1997): 146–153.
  • [5] Cooperstock J. R., Tanikoshi K., Beirne G., Narine T., Buxton W. A., Evolution of a reactive environment, Proceedings of the SIGCHI conference on Human factors in computing systems (1995): 170–177.
  • [6] Brown M. G., Supporting user mobility, Mobile Communications, Springer US (1996): 69–77.
  • [7] Rekimoto J., Ayatsuka Y., Hayashi K., Augment-able reality: Situated communication through physical and digital spaces, Wearable Computers, Digest of Papers, Second International Symposium (1998): 68–75.
  • [8] Elrod S., Hall G., Costanza R., Dixon M., Des Rivi´eres J., Responsive Office Environments, Communications of the ACM, 36(7) (1993): 84–85.
  • [9] Fickas S., Kortuem G., Segall Z., Software organization for dynamic and adaptable wearable systems, Wearable Computers, Digest of Papers, First International Symposium (1997): 56–63.
  • [10] Brown P. J., Bovey J. D., Chen X., Context-aware applications: from the laboratory to the marketplace, Personal Communications, IEEE, 4(5) (1997): 58–64.
  • [11] Ryan N. S., Pascoe J., Morse D. R., Enhanced reality fieldwork: the context-aware archaeological assistant, Computer applications in archaeology (1998).
  • [12] Chen G., Kotz D., A survey of context-aware mobile computing research, Technical Report TR2000-381, Dept. of Computer Science, Dartmouth College (2000).
  • [13] Schmidt A., Aidoo K. A., Takaluoma A., Tuomela U., Van Laerhoven K., Van de Velde W, Advanced interaction in context, Handheld and ubiquitous computing, Springer Berlin Heidelberg (1999): 89–101.
  • [14] Dey A. K., Abowd G. D., Salber D., A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications, Human-computer interaction, 16(2) (2001): 97–166.
  • [15] Perera C., Zaslavsky A., Christen P., Georgakopoulos D., Context Aware Computing for The Internet of Things: A Survey (2013).
  • [16] Hu J., Weaver A. C., A dynamic, context-aware security infrastructure for distributed healthcare applications, Proceedings of the first workshop on pervasive privacy security, privacy, and trust (2004).
  • [17] Al-Muhtadi J., Ranganathan A., Campbell R., Mickunas M. D., Cerberus: a context-aware security scheme for smart spaces, Pervasive Computing and Communications, 2003.(PerCom 2003), Proceedings of the First IEEE International Conference (2003): 489–496.
  • [18] Covington M. J., Fogla P., Zhan Z., Ahamad M., A context-aware security architecture for emerging applications, Computer Security Applications Conference, Proceedings (2002): 249–258.
  • [19] Kotulski Z., Sepczuk M., Sitek A., Tunia M.A., Adaptable context management framework for secure network services, (to appear) (2014).
  • [20] B¨uchholz T., Kupper A., Schiffers M., Quality of Context: What It Is And Why We Need It, Proceedings of the 10th International Workshop of the HP OpenView University Association (HPOVUA) (2003).
  • [21] Manzoor A., Truong H. L., Dustdar S., On the Evaluation of Quality of Context, Proceedings of the 3rd European Conference on Smart Sensing and Context (2008): 140–153.
  • [22] Sabater J., Sierra C., Regret: A reputation model for gregarious societies, Fourth workshop on deception fraud and trust in agent societies, 70 (2001).
  • [23] Mui L., Mohtashemi M., Halberstadt A., A computational model of trust and reputation, System Sciences, 2002, HICSS, Proceedings of the 35th Annual Hawaii International Conference (2002): 2431–2439.
  • [24] Mitzal B., Trust in modern societies, Polity, Cambridge (1996).
  • [25] Abdul-Rahman A., Hailes S., Supporting trust in virtual communities, System Sciences, 2000, Proceedings of the 33rd Annual Hawaii International Conference (2000):4–7.
  • [26] Wang Y., Vassileva J., Trust and reputation model in peer-to-peer networks, Peer-to-Peer Computing, Proceedings, Third International Conference (2003): 150–157.
  • [27] Grandison T., Sloman M., A survey of trust in internet applications, Communications Surveys & Tutorials (2000): 2–16.
  • [28] Gambetta D., Can we trust trust?, Trust: Making and breaking cooperative relations (2000): 213–237.
  • [29] Wang Y., Li L., Two-dimensional trust rating aggregations in service-oriented applications, Services Computing, IEEE Transactions 4(4) (2011): 257–271.
  • [30] Li L., Wang Y., A trust vector approach to service-oriented applications, Web Services, 2008, ICWS’08, IEEE International Conference (2008): 270–277.
  • [31] Zhang H., Wang Y., Zhang X., A trust vector approach to transaction context-aware trust evaluation in e-commerce and e-service environments, Service-Oriented Computing and Applications (SOCA), 2012 5th IEEE International Conference (2012): 1–8.
  • [32] Ray I., Chakraborty S., A vector model of trust for developing trustworthy systems, Computer Security–ESORICS (2004): 260–275.
  • [33] Cherdantseva Y., Hilton J., A Reference Model of Information Assurance & Security, Availability, Reliability and Security (ARES), 2013 Eighth International Conference (2013): 546–555.
  • [34] Bellavista P., Corradi A., Fanelli M., Foschini L., A Survey of Context Data Distribution for Mobile Ubiquitous Systems, ACM Computing Surveys (CSUR), 44(4) (2012).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-bc021c45-d628-4f98-80b8-a7feaf9d8d0d
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.