Context - Sensitive Security in a Pervasive Environment Research Report

نویسندگان

  • Charles-Eric Pigeot
  • Yann Gripay
  • Jean-Marc Pierson
  • Vasile-Marian Scuturici
چکیده

Ubiquitous systems enable us to have an overview of what digital environments will look like in the future. The opportunities given by the pervasive systems, both in terms of applications and services to the user are manifold and very promising. From the user point of view, privacy and security of his personal data is a real issue, which must be addressed to make pervasive systems accepted. A wide adoption of pervasive systems can not be possible without an integrated approach to security. We propose a model of security and privacy for ubiquitous environments, integrated with an architecture, namely PerSE, in which privacy is a main concern and in which it is at the core of the conception.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Design and Verification of Pervasive System Security

The vision of Pervasive Computing is that every device we communicate today has become a part of everyday objects, augmented with information services. Though there are a number of frameworks is been developed for security of smart systems, there is still space for research in the field of security of these systems. User privacy and Trust needs more concentration in a pervasive environment. Con...

متن کامل

A Generic Framework for Context-Based Distributed Authorizations

In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and off for denying access. This access policy is principally based on the user’s identity and is static over time. As applications become more pervasive, security policies must become more flexible in order to respond to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006