ABSTRACT
In this paper, we introduce a new paradigm for global computation, one in which the context of collected information drives the type of processing and dissemination the information receives as it is dispersed around the world. The creation of this model has necessitated the development of new types of methods for securing contextual information because the internet itself inherently has not have security mechanisms. Security is typically localized at the nodes on the internet that process information. There are multiple models and methods that are under development to provide security for contexts. This paper presents the basics of a model that allows context consumers to determine the level of security contextual information should have. Security levels have a direct correlation with confidence in the integrity of contextual data and thus application of its processing.
- ]]Rosemann, M., & Recker, J. (2006). "Context-aware process design: Exploring the extrinsic drivers for process flexibility". T. Latour & M. Petit 18th international conference on advanced information systems engineering. proceedings of workshops and doctoral consortium: 149--158, Luxembourg: Namur University Press.Google Scholar
- ]]Schilit, B. N. Adams, and R. Want. (1994). "Context-aware computing applications" (PDF). IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'94), Santa Cruz, CA, US: 89--101. Google ScholarDigital Library
- ]]Schilit, B. N. and Theimer, M. M. (1994). "Disseminating Active Map Information to Mobile Hosts". IEEE Network 8 (5): 22--32. doi:10.1109/65.313011.Google ScholarDigital Library
- ]]Dey, Anind K. (2001). "Understanding and Using Context". Personal Ubiquitous Computing 5 (1): 4--7. doi:10.1007/s007790170019. Google ScholarDigital Library
- ]]Cristiana Bolchini and Carlo A. Curino and Elisa Quintarelli and Fabio A. Schreiber and Letizia Tanca (2007). "A data-oriented survey of context models" (PDF). SIGMOD Rec. (ACM) 36 (4): 19--26. doi:10.1145/1361348.1361353. ISSN 0163--5808. http://carlo.curino.us/documents/curino-context2007-survey.pdf. Google ScholarDigital Library
- ]]Schmidt, A.; Aidoo, K. A.; Takaluoma, A.; Tuomela, U.; Van Laerhoven, K; Van de Velde W. (1999). "Advanced Interaction in Context" (PDF). 1th International Symposium on Handheld and Ubiquitous Computing (HUC99), Springer LNCS, Vol. 1707: 89--101. Google ScholarDigital Library
Index Terms
- Security models for contextual based global processing an architecture and overview
Recommendations
Global Information Security Factors
The Internet has changed security and because the Internet is borderless, security threats are now on a global scale. In this paper, the authors explore the global nature of information security from the perspectives of corporate professionals. Through ...
A Security Architecture for Intranet Based on Security Area Division
IITSI '10: Proceedings of the 2010 Third International Symposium on Intelligent Information Technology and Security InformaticsAiming at the security requirement of the Intranet that is different from Internet, an security architecture for Intranet is proposed. In physical layer and data link layer, based on network switch the intranet is divided into several parts separated ...
A Policy-Based Architecture for Web Services Security Processing
ICEBE '12: Proceedings of the 2012 IEEE Ninth International Conference on e-Business EngineeringWith the development of the Internet, Web Services technology has gradually become the development direction of the e-business, e-government and other fields, and the corresponding security mechanism has received unprecedented attention, while how to ...
Comments