1 Context-base Access Management in Ubiquitous Environment 윤혜진 2007-08-10.

Slides:



Advertisements
Similar presentations
Nortel Proprietary Information 2 The Impact of the World Wide Web on Carrier Networks – an Historic Opportunity Geoff Hall Chief Technology Officer, EMEA.
Advertisements

Multi-hop wireless networks Fact or fiction? Injong Rhee Department of Computer Science North Carolina State University.
Centre for the Enhancement of Learning and Teaching Ubiquitous Computing J.I.Mathers Sept
A Comprehensive Study for RFID Malwares on Mobile Devices TBD.
© 2004 Mobile VCE New Revenues through Ubiquitous Services: Removing the Barriers Steve Wright Head of Strategic Research, BT on behalf.
Unplugged: getting mobile in education Gihan Lahoud Sydney Institute, TAFE NSW.
BY MAULIK PATEL CED, GPERI Computing Architecture.
MobiShare: Sharing Context-Dependent Data & Services from Mobile Sources Efstratios Valavanis, Christopher Ververidis, Michalis Vazirgianis, George C.
A Context Framework for Ambient Intelligence. Context servers Motivation interoperable Machine processable Security & privacy.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
A Hybrid Model of Context-aware Service Provisioning Implemented on Smart Phones International Conference on Pervasive Services th June 2006.
ICT 1 “Putting Context in Context: The Role and Design of Context Management in a Mobility and Adaptation Enabling Middleware” Marius Mikalsen Research.
Ubiquitous Access Control Workshop 1 7/17/06 Access Control and Authentication for Converged Networks Z. Judy Fu John Strassner Motorola Labs {judy.fu,
A Mobile Agent Approach for Ubiquitous and Personalized eHealth Information Systems Panagiotis Germanakos 1, Constantinos Mourlas 1, George Samaras 2 1.
Towards Ubiquitous Government Services through Adaptations with Context and Views in a Three-Tier Architecture Dan Hong, SC Cheung, SMIEEE Department of.
Vertical Handoffs in Wireless Overlay Networks Mark Stemm Helen Wang Randy H. Katz Daedalus Wireless Research Group Department of EECS University of California,
A Seamless Handoff for Dual-interfaced Mobile Devices in Hybrid WLAN Speaker : Rui-Yi Chien Date : 2005 / 02 / 17.
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
France Telecom Group Brussels 19 January 2010 Smart and Ubiquitous Audio-visual and Multimedia Services Framework Program 7 for period Consultation.
UNM Wireless Overview Irteza Rana Adiel Sanchez Network AssistantNetwork Engineer.
A Conceptual Framework for Provisioning Context-aware Mobile Cloud Services Hyun Jung La and Soo Dong Kim Department of Computer Science Soongsil University.
Context-Aware Middleware for Anytime, Anywhere Social Networks Dario Bottazzi, Rebecca Montanari, and Alessandra Toninelli University of Bologna IEEE Intelligent.
Monitoring Architecture for Lawful Interception in VoIP Networks Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE.
Performance analysis and prediction of physically mobile systems Point view: Computational devices including Mobile phones are expanding. Different infrastructure.
Patterns for Location and Context-based access control
Software Architecture Framework for Ubiquitous Computing Divya ChanneGowda Athrey Joshi.
Integrated Support for Handoff Management and Context Awareness in Heterogeneous Wireless Networks ACM MPAC’05.
William Easton. Introduction  Mobile Environments  Locking and Data Starvation  Mobile DB Architecture  Timing Mechanisms  Static Timer  Dynamic.
Thesis draft ide. Draft v1.0 ide commented by jin.
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
Secure Systems Research Group - FAU Contexts and Context-based Access Control Model PhD Dissertation Progress Report Candidate: Alvaro E. Escobar Advisors:
Enabling Shared Context Anne Thomas Manes Director Market Innovation W3C Web Services Workshop.
Ubiquitous learning. What is ubiquitous learning? Computing and communication technologies Characteristics of ubiquitous learning Context and ubiquitous.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Mobile Communication Middleware By:Lekometsa Mokhesi Anisa Ragalo Supervisor: Ken Macgregor.
Enterprise Solutions Chapter 12 – Mobility and Its Need in an Enterprise.
On Requirements for Mobile Commerce By Aj.Pongthep Termsnguanwong.
Personal Information Management in a Ubiquitous Computing Environment Institute of Systems & Information Technologies/KYUSHU Kenichi Takahashi.
Video – Any Device, Anytime, Anywhere - Motorola Inc.
© 2007 Mobile VCE 15th September 2008 PIMRC 2008: Ubiquitous Services over Heterogeneous Networks - The Key to ‘True’ Mobility Stewart.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
Problem in Current Internet - Supporting Seamless Connection in Heterogeneous Networks Future Internet term project KHU Computer Engineering Networking.
Ashley White.  Computing that is made to be found anywhere and everywhere.  A high degree of communication among devices and sensors through a ubiquitous.
ROVER TECHNOLOGY PRESENTED BY Gaurav Dhuppar Final Year I.T. GUIDED BY Ms. Kavita Bhatt Lecturer I.T.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Modular framework support for context-aware mobile cinema Andreas Schrader Darren V. Carlson Dominik Busch (International School of New Media, University.
Franklin Consulting Wireless Networking in Education Tom Franklin TechLearn ‑ consulting.ac.uk.
Context-based Access Control
Using Service-Oriented Architecture in Context-Aware Applications Damião Ribeiro de Almeida Information System Laboratory Universidade Federal de Campina.
Business Communications Paradigm Shift telephone web conferencing teleconferencing two-party video multi-party video tools.
DeepDroid Dynamically Enforcing Enterprise Policy Manwoong (Andy) Choi
User-group-based Security Policy for Service Layer Jianjie You Myo Zarny Christian Jacquenet
Context-Aware Middleware for Resource Management in the Wireless Internet US Lab 신현정.
Mary Ganesan and Lora Strother Campus Tours Using a Mobile Device.
User-group-based Security Policy for Service Layer
Context-Aware Computing
Mobile &Wireless Computing
Mobile Computing.
Session 2 – New Generation Service Challenges
PREPARED BY: RIDDHI PATEL (09CE085)
Mobile Gaming Through The Wireless Internet
WELCOME TO SEMINAR.
IST-MUSIC Project Overview
Introduction to Mobile Computing
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Presentation transcript:

1 Context-base Access Management in Ubiquitous Environment 윤혜진

2 Cotnents  Access Control Issues in Ubiquitous Environments  UbiCOSM Security Framework Security Model Access Control Middleware  Case Study: Mobile Office Application  Conclusions and Future Work

3 introduction  Wireless network connectivity and portable devices anywhere and at anytime access from various access devices  Novel access control challenges: Paradigm shift from subject-centric to context-centric access control  Un-informative identity or not trustworthy  Traditional identity-based access control models are inadequate for Ubiquitous Environments  Static characterization of context

4 UbiCOSM Security Framework UbiCOSM (Ubiquitous Context-based Security Middleware) Permissions are directly associated with contexts Context=grouping mechanism for applicable permissions Goal: Immediate Controlled visibility of accessible resources and of other mobile users locally executing

5 UbiCOSM Context Model context Physical ContextLogical Context Resource Tourist Logical MonitoringSystem.GetVisitNumber.IsLess(N) ResourceManager.GetInfo(Spiderman Movie) Cinema Physical GeoCoordinate.IsEqual(Area.GetInfo)

6 Metadata Profiles Access Control Policies System Control PoliciesSecurity Waves a ….. nearby cinemas Spiderman movie find vacant seats always anywhere within 3 km b UbiCOSM Security Model

7 p1 see pos a b AdultP1<Simple(Adult,P1) Waiting Room P2 Cinema Hall P3 P4 Tourist Waiting Room Tourist Tour Guide Access Control Policy Specific context conditions specific permissions

8 UbiCOSM architecture

9 And(hasSeat(N), desireMovie(movieName) Simple(isNotFull) And(FarFromCinema, InQueue) And(friend, relative) p2 find_a_cinema pos p3 insert_an_opinion(myOpinion) pos p4 book_Ticket(N) neg p1 retrieve_opinion pos a b c d