Proceedings of the 5th ACM international workshop on Mobility management and wireless access
Adaptive security protocol selection for mobile computing
Journal of Network and Computer Applications
Security in depth through smart space cascades
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Towards a framework to characterize ubiquitous software projects
Information and Software Technology
Hi-index | 0.00 |
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture solution in the wireless Internet is based on mobile proxies (implemented as mobile agent-based middleware components) over the fixed network that follow the movements and act on behalf of the limited wireless clients. It is crucial that mobile proxies have full visibility of their context, i.e., the set of available and relevant resources, depending on access control rules, client location, user preferences, privacy requirements, terminal characteristics, and current state of hosting environments. The paper presents the design and implementation of a context-centric security middleware, called UbiCOSM, for MA-based service provisioning in pervasive computing. UbiCOSM dynamically determines the contexts of mobile proxies, and effectively rules the access to them, by taking into account different types of metadata (user profiles and authorization policies), expressed at a high level of abstraction and cleanly separated from the service logic. The paper also shows the functioning of UbiCOSM in the design and the development of a mobile context-centric airport business assistant.