skip to main content
10.1145/1558607.1558668acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Security models for contextual based global processing an architecture and overview

Published:13 April 2009Publication History

ABSTRACT

In this paper, we introduce a new paradigm for global computation, one in which the context of collected information drives the type of processing and dissemination the information receives as it is dispersed around the world. The creation of this model has necessitated the development of new types of methods for securing contextual information because the internet itself inherently has not have security mechanisms. Security is typically localized at the nodes on the internet that process information. There are multiple models and methods that are under development to provide security for contexts. This paper presents the basics of a model that allows context consumers to determine the level of security contextual information should have. Security levels have a direct correlation with confidence in the integrity of contextual data and thus application of its processing.

References

  1. ]]Rosemann, M., & Recker, J. (2006). "Context-aware process design: Exploring the extrinsic drivers for process flexibility". T. Latour & M. Petit 18th international conference on advanced information systems engineering. proceedings of workshops and doctoral consortium: 149--158, Luxembourg: Namur University Press.Google ScholarGoogle Scholar
  2. ]]Schilit, B. N. Adams, and R. Want. (1994). "Context-aware computing applications" (PDF). IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'94), Santa Cruz, CA, US: 89--101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. ]]Schilit, B. N. and Theimer, M. M. (1994). "Disseminating Active Map Information to Mobile Hosts". IEEE Network 8 (5): 22--32. doi:10.1109/65.313011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. ]]Dey, Anind K. (2001). "Understanding and Using Context". Personal Ubiquitous Computing 5 (1): 4--7. doi:10.1007/s007790170019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. ]]Cristiana Bolchini and Carlo A. Curino and Elisa Quintarelli and Fabio A. Schreiber and Letizia Tanca (2007). "A data-oriented survey of context models" (PDF). SIGMOD Rec. (ACM) 36 (4): 19--26. doi:10.1145/1361348.1361353. ISSN 0163--5808. http://carlo.curino.us/documents/curino-context2007-survey.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. ]]Schmidt, A.; Aidoo, K. A.; Takaluoma, A.; Tuomela, U.; Van Laerhoven, K; Van de Velde W. (1999). "Advanced Interaction in Context" (PDF). 1th International Symposium on Handheld and Ubiquitous Computing (HUC99), Springer LNCS, Vol. 1707: 89--101. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security models for contextual based global processing an architecture and overview

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
              April 2009
              952 pages
              ISBN:9781605585185
              DOI:10.1145/1558607

              Copyright © 2009 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 13 April 2009

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader