Abstract
In this paper, we present an adaptive security model that aims at securing resources in heterogeneous networks. Traditional security model usually work according to a static decision-making approach. However, we may establish a better approach to heterogeneous networks if we use a dynamic approach to construct the security level. Security management relies on a set of contextual information collected from the user and the resource environments, and that infers the security level to enforce. These security levels are dynamically deduced using one of these two algorithms: MAUT and Simple Heuristics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Brézillon, P., et al.: SART: An intelligent assistant for subway control. Pesquisa Operacional, Brazilian Operations Research Society 20(2), 247–268 (2002)
Brézillon, P.: Context in Artificial Intelligence: I. A survey of the literature. Computer & Artificial Intelligence 18(4), 321–340 (1999), http://wwwpoleia.lip6.fr/~brezil/Pages2/Publications/CAI1-99.pdf
Chung, M., Honavar, V.: A Negotiation Model in Agent-Mediated Electronic Commerce. In: Proc. IEEE Int’l Symposium on Multimedia Software Engineering, Taipei, December 2000, pp. 403–410 (2000)
Covington, M.J., et al.: A Security Architecture for Context-Aware Applications, tech. report, GIT-CC-01-12, College of Computing, Georgia Institute of Technology (May 2001)
Covington, M.J., et al.: Securing Context-Aware Applications Using Environment Roles. In: Proc. 6th ACM Symposium on Access Control Models and Technologies, Chantilly, VI, USA, May 2001, pp. 10–20 (2001)
Covington, M.J., et al.: A Context-Aware Security Architecture for Emerging Applications. In: Proc. Annual Computer Security Applications Conf (ACSAC), Las Vegas, Nevada, USA (December 2002)
Dey, A.K.: Ph. D. dissertation, Providing Architectural Support for Building Context-Aware Applications, Georgia Institute of Technology (2000)
Henricksen, K., et al.: Modeling Context Information in Pervasive Computing Systems. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol. 2414, pp. 167–180. Springer, Heidelberg (2002)
Keeney, R.L., Raiffa, H.: Decisions with Multiple Objectives: Preferences and Value Tradeoffs. John Wiley & Sons, New York (1976)
Mostéfaoui, G.K., Brézillon, P.: A generic framework for context-based distributed authorizations. In: Blackburn, P., Ghidini, C., Turner, R.M., Giunchiglia, F. (eds.) CONTEXT 2003. LNCS (LNAI), vol. 2680, pp. 204–217. Springer, Heidelberg (2003)
Long, S., et al.: Rapid prototyping of mobile context-aware applications: The cyberguide case study. In: Proc. the 1996 Conf. Human Factors in Computing Systems (CHI 1996), pp. 293–294 (1996)
Martignon, L., Hoffrage, U.: Why Does One-Reason Decision Making Work? In: Simple Heuristics That Make Us Smart, pp. 119–140. Oxford University Press, New York (1999)
Masone, C.: Role Definition Language (RDL): A Language to Describe Context-Aware Roles, tech. report, TR2001-426, Dept. of Computer Science, Dartmouth College (May 2002)
Osbakk, P., Ryan, N.: Context Privacy, CC/PP, and P3P. In: Proc. UBICOMP 2002 - Workshop on Security in Ubiquitous Computing, pp. 9–10 (2002)
Rakotonirainy, A.: Context-oriented programming for pervasive systems, tech. report, University of Queensland (September 2002)
The SART Project, http://www-poleia.lip6.fr/~brezil/SART/index.html
Schmidt, A., et al.: There is more to context than location. Computers and Graphics 23(6), 893–902 (1999)
Schäfer, R.: Rules for Using Multi-Attribute Utility Theory for Estimating a User’s Interests. In: Proc. 9th GI-Workshop. ABIS-Adaptivität und Benutzermodellierung in interaktiven softwaresystemen, Dortmund, Germany (2001)
Shankar, N., Balfanz, D.: Enabling Secure Ad-hoc Communication Using Context-Aware Security Services (Extended Abstract). In: Proc. UBICOMP 2002 -Workshop on Security in Ubiquitous Computing (2002)
Strat, T.M., et al.: Context-Based Vision. In: Firschein, O., Strat, T.M. (eds.) Chapter in RADIUS: Image Understanding for Intelligence Imagery, Morgan Kaufmann, San Francisco (1997)
von Winterfeld, D., Edwards, W.: Decision Analysis and Behavioral Research. Cambridge University Press, Cambridge (1986)
Weiser, M.: The computer for the 21st Century. Scientific American 265(3), 66–75 (1991)
Yau, S.S., et al.: Reconfigurable Context-Sensitive Middleware for Pervasive Computing. IEEE Pervasive Computing, joint special issue with IEEE Personal Communications 1(3), 33–40 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chae, J., Mostéfaoui, G.K., Chung, M. (2004). An Adaptive Security Model for Heterogeneous Networks Using MAUT and Simple Heuristics. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3046. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24768-5_106
Download citation
DOI: https://doi.org/10.1007/978-3-540-24768-5_106
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22060-2
Online ISBN: 978-3-540-24768-5
eBook Packages: Springer Book Archive