Knowledge representation: logical, philosophical and computational foundations
Knowledge representation: logical, philosophical and computational foundations
Conflicts in Policy-Based Distributed Systems Management
IEEE Transactions on Software Engineering
A Context-Aware Security Architecture for Emerging Applications
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
DSM '04 Proceedings of the 1st international doctoral symposium on Middleware
Context-Aware Computing: A Guide for the Pervasive Computing Community
ICPS '04 Proceedings of the The IEEE/ACS International Conference on Pervasive Services
Task-Realization models in contextual graphs
CONTEXT'05 Proceedings of the 5th international conference on Modeling and Using Context
Hi-index | 0.00 |
In most current systems, managing access to networks rely on static rules implemented on firewalls and IDS (Intrusion Detection Systems). These measures lack a systematic consideration of the context within which an attack occurs. Indeed, we argue that network access management must be enforced by identifying the sensible contexts in which the hacker tries to drive the system to, before performing the potential dangerous action. Thus, our claim concerns a human-centered management of security as opposed to computing-centered security. In this direction, we propose a visual model that allows expressing sensible contexts for blocking hackers when they enter such sensible contexts. This surveillance operation could be lead by a human or a system. Additionally, our solution allows interlocked processes of incremental acquisition of knowledge and learning of new practices that enriches the initial security policy with new security contexts.