The context toolkit: aiding the development of context-enabled applications
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Toward a secure system engineering methodolgy
Proceedings of the 1998 workshop on New security paradigms
Dynamic Context-aware Access Control for Grid Applications
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
A Host-Based Approach to Network Attack Chaining Analysis
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
An Anonymous Context Aware Access Control Architecture For Ubiquitous Services
MDM '06 Proceedings of the 7th International Conference on Mobile Data Management
Information security implications of autonomous systems
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
ISWC'06 Proceedings of the 5th international conference on The Semantic Web
Hi-index | 0.00 |
The potential for rapid and diverse interconnectivity through devices utilising heterogeneous communications interfaces has enabled a truly ubiquitous computing environment. However, this has resulted in equally ubiquitous security risks due principally to the number and complexity of services being run over such networks. As technology advances towards the realisation of a ubiquitous computing environment, what impact does this have on the traditional information security triangle, of preserving the confidentiality, integrity and availability of information? And how does this influence, future information security requirements, particularly in light of always-on business processes which require real-time information sharing? This paper describes research conducted into answering these questions. Emphasis is placed on the need for risk management, and how this may be achieved through context-based access control mechanisms and pro-active threat assessment techniques.