Lotz et al., 2008 - Google Patents
Towards Adaptive Security for Ubiquitous Computing Systems: MOSQUITO and SerenityLotz et al., 2008
- Document ID
- 11088655581415136233
- Author
- Lotz V
- Compagna L
- Wrona K
- Publication year
- Publication venue
- Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
External Links
Snippet
The flexibility and dynamism of ubiquitous computing systems have a strong impact on the way their security can be achieved, reaching beyond traditional security paradigms like perimeter security and communication channel protection. Constant change of both the …
- 230000003044 adaptive 0 title abstract description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/109—Time management, e.g. calendars, reminders, meetings, time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lopez et al. | Access control for cyber-physical systems interconnected to the cloud | |
Alam et al. | Interoperability of security-enabled internet of things | |
van Sinderen et al. | Supporting context-aware mobile applications: an infrastructure approach | |
US8229785B2 (en) | Mobile network dynamic workflow exception handling system | |
Corredor et al. | Knowledge-aware and service-oriented middleware for deploying pervasive services | |
Bajaj et al. | 4W1H in IoT semantics | |
Chen | Collaboration IoT-based RBAC with trust evaluation algorithm model for massive IoT integrated application | |
Ahmed et al. | Service management for IoT: requirements, taxonomy, recent advances and open research challenges | |
Singh et al. | Self-adaptive and secure mechanism for IoT based multimedia services: a survey | |
Kayes et al. | An ontological framework for situation-aware access control of software services | |
Neeli et al. | Insight to security paradigm, research trend & statistics in internet of things (IoT) | |
Barati et al. | Enhancing user privacy in IoT: Integration of GDPR and blockchain | |
Fernandez et al. | Privacy-preserving architecture for cloud-IoT platforms | |
Jung et al. | Context-aware policy enforcement for android | |
Massaguer et al. | Middleware for pervasive spaces: Balancing privacy and utility | |
Ramakrishnan et al. | PRISM: Policy-driven risk-based implicit locking for improving the security of mobile end-user devices | |
Barsocchi et al. | Leveraging smart environments for runtime resources management | |
Lotz et al. | Towards Adaptive Security for Ubiquitous Computing Systems: MOSQUITO and Serenity | |
Li et al. | Trust-based access control for privacy protection in collaborative environment | |
De Mola et al. | The UbiMedic Framework to Support Medical Emergencies by Ubiquitous Computing. | |
Lacoste et al. | Evaluating confidence in context for context-aware security | |
McDonald et al. | Application security models for mobile agent systems | |
García Vázquez et al. | Fi-ware security: Future internet security core | |
Ahsan et al. | The State-of-the-Art Access Control Models in IoT: A Survey on the Requirements, Scale, and Future Challenges | |
KR101614448B1 (en) | A Building Method of Healthcare Information System Access Control Software Architecture Design Process under Integrated Medical Information Environment |