Contexts: a formalization and some applications
Contexts: a formalization and some applications
Understanding and Using Context
Personal and Ubiquitous Computing
Formalizing Context (Expanded Notes)
Formalizing Context (Expanded Notes)
Towards an Autonomic Computing Environment
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
Security in an autonomic computing environment
IBM Systems Journal
IBM Systems Journal
Defining Autonomic Computing: A Software Engineering Perspective
ASWEC '05 Proceedings of the 2005 Australian conference on Software Engineering
Autonomic Computing
Lucx: lucid enriched with context
Lucx: lucid enriched with context
An architecture for developing context-aware systems
MRC'05 Proceedings of the Second international conference on Modeling and Retrieval of Context
Hi-index | 0.00 |
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the traditional security model can not be applied to ACS any more. The goal of our research is to develop a context-based security model and architecture for ACS. Our focus is on self-protection feature of ACS. The self-protection feature is enforced through security contextsthat we define. By taking security contexts into account, security policies can dynamic change in order to cope with new environment.