Skip to main content

COSMOS: A Context-Centric Access Control Middleware for Mobile Environments

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2881))

Abstract

User/terminal mobility during service provisioning and high heterogeneity of wireless portable devices identify novel challenges for service delivery in ubiquitous pervasive environments. An emerging architecture solution in the wireless Internet is to have middleware components (mobile proxies) over the fixed network that follow the movements and act on behalf of the limited wireless clients. It is crucial that mobile proxies have full visibility of their context, i.e., the set of available and relevant resources depending on access control rules, client location, user preferences, privacy requirements, terminal characteristics, and current state of hosting environments. The paper presents the design and implementation of a context-centric access control middleware, called COSMOS, for the wireless Internet. COSMOS dynamically determines the contexts of mobile proxies, and effectively rules the access to them, by taking into account different types of metadata (user profiles and system/user-level authorization policies), expressed at a high level of abstraction and cleanly separated from the service logic. The paper also shows how COSMOS facilitates the development of articulated access control strategies in the case study of a context-dependent movie-info service deployed over IEEE 802.11 network localities.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, L.F., McNair, J., Ho, J., Uzunalioglu, H., Wenye, W.: Mobility management in current and future communications networks. IEEE Network 12(4) (July/August 1998)

    Google Scholar 

  2. Dey, A.K., Abowd, G.D.: Towards a Better Understanding of Context and Context- Awareness. In: Proc. of CHI, The Hague, The Netherlands (April 2000)

    Google Scholar 

  3. Rodden, T., Cheverst, K., Davies, K., Dix, A.: Exploiting Context in HCI Design for Mobile Systems. In: Proc. of Workshop on Human Computer Interaction with Mobile Devices, Scotland (May 1998)

    Google Scholar 

  4. Bellavista, P., Corradi, A., Montanari, R., Stefanelli, C.: Dynamic Binding in Mobile Applications: a Middleware Approach. IEEE Internet Computing 7(2) (March/April 2003); Special Issue on Mobile Applications

    Google Scholar 

  5. IKV++ Technologies AG, enago Open Service Platform, http://www.ikv.de

  6. Bellavista, P., Corradi, A., Stefanelli, C.: The Ubiquitous Provisioning of Internet Services to Portable Devices. IEEE Pervasive Computing 1(3) (July-September 2002)

    Google Scholar 

  7. Vigna, G. (ed.): Mobile Agents and Security. LNCS, vol. 1419. Springer, Heidelberg (1998)

    Google Scholar 

  8. Oppliger, R.: Security issues related to mobile code and agent-based systems. Computer Communications, Elsevier Science 22(12) (1999)

    Google Scholar 

  9. Montanari, R., Stefanelli, C., Dulay, N.: Flexible Security Policies for Mobile Agents Systems. Microprocessors and Microsystems 25(2). Elsevier Science, Amsterdam (2001)

    Google Scholar 

  10. Mitrovic, N., Arronategui Arribalzaga, U.: Mobile Agent security using Proxy-agents and Trusted domains. In: Proc. of SEMAS 2002, Bologna, Italy (July 2002)

    Google Scholar 

  11. Gong, L.: Inside Java 2 Platform Security. Addison-Wesley, Reading (1999)

    Google Scholar 

  12. Bellavista, P., Corradi, A., Stefanelli, C.: Protection and Interoperability for Mobile Agents: A Secure and Open Programming Environment. IEICE Transactions on Communications (Special Issue on Autonomous Decentralized, Systems E83-B(5) (May 2000)

    Google Scholar 

  13. Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M.D., Yi, S.g.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: Proc. of ICDCS 2002. IEEE Press, Vienna (2002)

    Google Scholar 

  14. Wright, S., Chadha, R., Lapiotis, G. (eds.): Special Issue on Policy Based Networking. IEEE Network 16(2) (March 2002)

    Google Scholar 

  15. Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2(1) (January/March 2003)

    Google Scholar 

  16. Corradi, A., Dulay, N., Montanari, R., Stefanelli, C.: Policy-driven Management of Mobile Agent Systems. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, p. 214. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  17. Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18–39. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  18. Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: Negotiating Trust on the Web. IEEE Internet Computing 6(6) (November/December 2002)

    Google Scholar 

  19. Covington, M.J., Long, W., Srinivasan, S., Dey, A.K., Ahamad, M., Abowd, G.D.: Securing Context-Aware Applications Using Environment Roles. In: ACM, SACMAT 2001, Chantilly, Virginia, USA (May 2001)

    Google Scholar 

  20. Mostéfaoui, G.K., Brézillon, P.: A Generic Framework for Context-Based Distributed Authorization. In: Blackburn, P., Ghidini, C., Turner, R.M., Giunchiglia, F. (eds.) CONTEXT 2003. LNCS(LNAI), vol. 2680, pp. 204–217. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bellavista, P., Montanari, R., Tibaldi, D. (2003). COSMOS: A Context-Centric Access Control Middleware for Mobile Environments. In: Horlait, E., Magedanz, T., Glitho, R.H. (eds) Mobile Agents for Telecommunication Applications. MATA 2003. Lecture Notes in Computer Science, vol 2881. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39646-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39646-8_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20298-1

  • Online ISBN: 978-3-540-39646-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics