Abstract
User/terminal mobility during service provisioning and high heterogeneity of wireless portable devices identify novel challenges for service delivery in ubiquitous pervasive environments. An emerging architecture solution in the wireless Internet is to have middleware components (mobile proxies) over the fixed network that follow the movements and act on behalf of the limited wireless clients. It is crucial that mobile proxies have full visibility of their context, i.e., the set of available and relevant resources depending on access control rules, client location, user preferences, privacy requirements, terminal characteristics, and current state of hosting environments. The paper presents the design and implementation of a context-centric access control middleware, called COSMOS, for the wireless Internet. COSMOS dynamically determines the contexts of mobile proxies, and effectively rules the access to them, by taking into account different types of metadata (user profiles and system/user-level authorization policies), expressed at a high level of abstraction and cleanly separated from the service logic. The paper also shows how COSMOS facilitates the development of articulated access control strategies in the case study of a context-dependent movie-info service deployed over IEEE 802.11 network localities.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Akyildiz, L.F., McNair, J., Ho, J., Uzunalioglu, H., Wenye, W.: Mobility management in current and future communications networks. IEEE Network 12(4) (July/August 1998)
Dey, A.K., Abowd, G.D.: Towards a Better Understanding of Context and Context- Awareness. In: Proc. of CHI, The Hague, The Netherlands (April 2000)
Rodden, T., Cheverst, K., Davies, K., Dix, A.: Exploiting Context in HCI Design for Mobile Systems. In: Proc. of Workshop on Human Computer Interaction with Mobile Devices, Scotland (May 1998)
Bellavista, P., Corradi, A., Montanari, R., Stefanelli, C.: Dynamic Binding in Mobile Applications: a Middleware Approach. IEEE Internet Computing 7(2) (March/April 2003); Special Issue on Mobile Applications
IKV++ Technologies AG, enago Open Service Platform, http://www.ikv.de
Bellavista, P., Corradi, A., Stefanelli, C.: The Ubiquitous Provisioning of Internet Services to Portable Devices. IEEE Pervasive Computing 1(3) (July-September 2002)
Vigna, G. (ed.): Mobile Agents and Security. LNCS, vol. 1419. Springer, Heidelberg (1998)
Oppliger, R.: Security issues related to mobile code and agent-based systems. Computer Communications, Elsevier Science 22(12) (1999)
Montanari, R., Stefanelli, C., Dulay, N.: Flexible Security Policies for Mobile Agents Systems. Microprocessors and Microsystems 25(2). Elsevier Science, Amsterdam (2001)
Mitrovic, N., Arronategui Arribalzaga, U.: Mobile Agent security using Proxy-agents and Trusted domains. In: Proc. of SEMAS 2002, Bologna, Italy (July 2002)
Gong, L.: Inside Java 2 Platform Security. Addison-Wesley, Reading (1999)
Bellavista, P., Corradi, A., Stefanelli, C.: Protection and Interoperability for Mobile Agents: A Secure and Open Programming Environment. IEICE Transactions on Communications (Special Issue on Autonomous Decentralized, Systems E83-B(5) (May 2000)
Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M.D., Yi, S.g.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: Proc. of ICDCS 2002. IEEE Press, Vienna (2002)
Wright, S., Chadha, R., Lapiotis, G. (eds.): Special Issue on Policy Based Networking. IEEE Network 16(2) (March 2002)
Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2(1) (January/March 2003)
Corradi, A., Dulay, N., Montanari, R., Stefanelli, C.: Policy-driven Management of Mobile Agent Systems. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, p. 214. Springer, Heidelberg (2001)
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18–39. Springer, Heidelberg (2001)
Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: Negotiating Trust on the Web. IEEE Internet Computing 6(6) (November/December 2002)
Covington, M.J., Long, W., Srinivasan, S., Dey, A.K., Ahamad, M., Abowd, G.D.: Securing Context-Aware Applications Using Environment Roles. In: ACM, SACMAT 2001, Chantilly, Virginia, USA (May 2001)
Mostéfaoui, G.K., Brézillon, P.: A Generic Framework for Context-Based Distributed Authorization. In: Blackburn, P., Ghidini, C., Turner, R.M., Giunchiglia, F. (eds.) CONTEXT 2003. LNCS(LNAI), vol. 2680, pp. 204–217. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bellavista, P., Montanari, R., Tibaldi, D. (2003). COSMOS: A Context-Centric Access Control Middleware for Mobile Environments. In: Horlait, E., Magedanz, T., Glitho, R.H. (eds) Mobile Agents for Telecommunication Applications. MATA 2003. Lecture Notes in Computer Science, vol 2881. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39646-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-39646-8_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20298-1
Online ISBN: 978-3-540-39646-8
eBook Packages: Springer Book Archive