Skip to main content

Supporting Adaptive Security Levels in Heterogeneous Environments

  • Conference paper
Book cover Computational Science and Its Applications – ICCSA 2004 (ICCSA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3043))

Included in the following conference series:

  • 604 Accesses

Abstract

In this article, we present a context-based security management system that aims at securing resources in heterogeneous networks. Our approach relies on a federative model, where resources are logically grouped into federations (according to the type of services they provide or according to their physical location, in a business for instance). Security management relies on a set of contextual information collected from the user and the resource environments, and that infers the security level to enforce. These security levels are dynamically deduced using the MAUT algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser, M.: The Computer for the 21st Century. Scientific American 265(3), 66–75 (1991)

    Article  Google Scholar 

  2. CSI/FBI, 2002 CSI/FBI Computer Crime and Security Survey

    Google Scholar 

  3. Kouadri Mostéfaoui, G.: Security in Pervasive Environments, What’s Next. In: The proceedings of the 2003 International Conference on Security and Management (SAM 2003), Las Vegas, Nevada, USA (June 2003)

    Google Scholar 

  4. Kouadri Mostéfaoui, G., Brézillon, P.: A generic framework for context-based distributed authorizations. In: Blackburn, P., Ghidini, C., Turner, R.M., Giunchiglia, F. (eds.) CONTEXT 2003. LNCS, vol. 2680, pp. 204–217. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. The Jini homepage, www.jini.org

  6. Keeney, R.L., Raiffa, H.: Decisions with Multiple Objectives: Preferences and Value Tradeoffs. John Wiley & Sons, New York (1976)

    Google Scholar 

  7. Winterfeld, D., Edwards, W.: Decision Analysis and Behavioral Research. Cambridge University Press, Cambridge

    Google Scholar 

  8. Schaefer, R.: Rules for Using Multi-Attribute Utility Theory for Estimating a User’s Interests. In: Proceedings of the ninth GI-Workshop. ABIS-Adaptivität und Benutzermodellierung in interaktiven softwaresystemen, Dortmund, Germany (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mostéfaoui, G.K., Kim, M., Chung, M. (2004). Supporting Adaptive Security Levels in Heterogeneous Environments. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24707-4_65

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22054-1

  • Online ISBN: 978-3-540-24707-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics