The context toolkit: aiding the development of context-enabled applications
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
An authorization infrastructure for nomadic computing
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Building Large Knowledge-Based Systems; Representation and Inference in the Cyc Project
Building Large Knowledge-Based Systems; Representation and Inference in the Cyc Project
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
Think: A Software Framework for Component-based Operating System Kernels
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
A secure infrastructure for service discovery and access in pervasive computing
Mobile Networks and Applications - Security in mobile computing environments
A Context-Aware Security Architecture for Emerging Applications
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Providing Contextual Information to Pervasive Computing Applications
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Cerberus: A Context-Aware Security Scheme for Smart Spaces
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Practical Domain and Type Enforcement for UNIX
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
A pseudonymous communications infrastructure for the internet
A pseudonymous communications infrastructure for the internet
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
The dawning of the autonomic computing era
IBM Systems Journal
Security in an autonomic computing environment
IBM Systems Journal
Adaptive middleware for context-aware applications in smart-homes
MPAC '04 Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing
An Architectural Approach for Decentralized Trust Management
IEEE Internet Computing
Developing a Model for Trust Management in Pervasive Devices
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Software—Practice & Experience
Building Reconfigurable Component-Based OS with THINK
EUROMICRO '06 Proceedings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications
A software framework for autonomic security in pervasive environments
ICISS'07 Proceedings of the 3rd international conference on Information systems security
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Applying component-based design to self-protection of ubiquitous systems
Proceedings of the 3rd ACM workshop on Software engineering for pervasive services
Putting together QoS and security in autonomic pervasive systems
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
A security adaptation reference monitor for wireless sensor network
ISRN Communications and Networking
Hi-index | 0.00 |
We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or precision, defined according to a generic context confidence ontology. These metadata are processed through the network of federated distributed software services that support the acquisition, aggregation/fusion and interpretation of context, up to its exploitation by context-aware applications. This solution for qualifying and gauging context data makes possible its use in more critical applications of context awareness, such as adaptation of security mechanisms. We show how to implement with our framework a quality-critical application like contextual adaptation of security services, where security is tailored to the protection requirements of the current situation as captured by relevant context data.