Download presentation
Presentation is loading. Please wait.
1
An Application-led Approach for Security-related Research in Ubicomp Philip Robinson TecO, Karlsruhe University 11 May 2005
2
Background Research assistant with TecO, Uni. Karlsruhe since Nov 2001: Topic := Security for Ubiquitous Computing Co-organizer of 3 workshops on Security for UbiComp Researcher with SAP Research: Topic := Security and Trust for “Virtual Organizations”
3
General contribution to workshop Hypothesis: Application-led research should encompass both theory and practice (technology and scenarios) Problem: How do we balance the emphasis placed on either of these research aspects? Solution: Iterative Approach 1. Identify application scope of research and important questions to be answered 2. Determine a theoretical “ground model“ for generalizing the application 3. Analyse how technology affects different components of the ground model 4. Use scenarios to validate claims about technology 5. Continue to refine scope, theory and choices of technology
4
Why is this a problem for UbiComp? Focus on theory: often leads to very abstract conceptual claims that make general-purpose statements, stop at an architecture description, but do not produce real-world experience. (e.g. many context-based trust and security papers) Focus on practice: often leads to prototype bundling and papers that essentially describe the technical specifications of the selected hardware, language specifications (xml) and complex UML diagrams. (e.g. many SmartCard-based security papers)
5
General contribution to workshop Hypothesis: Application-led research should encompass both theory and practice (technology and scenarios) Problem: How do we balance the emphasis placed on either of these research aspects? Solution: Iterative Approach Identify application scope of research and important questions to be answered Determine a theoretical “ground model“ for formalizing the application Analyse how technology affects different components of the ground model Use scenarios to validate claims about technology Continue to refine scope, theory and choices of technology
6
Difference between application and scenario Application: the way in which processes, tasks and information are organized in order to optimally and consistently achieve specific objectives. Scenario: a very specific instance of an application with very specific properties, assumptions and an optional “storyline”.
7
(1) Can “Security” be considered as an “Application”? AdminTargetSubject protect notify response request Yes. Security is concerned with organizing processes, tasks and information in the form of controllers, monitors, policies and profiles, in order to optimally and consistently achieve the protection objectives of a target resource.
8
(2) Theoretical model for security 1.Configure: initialize monitor and log for collecting particular information 2.Sense: collect events from sensors deployed at target 3.Classify: use profiling scheme to specify a class for the events detected 4.Trigger Alarm: if a state of the target is not “locally controllable”, then issue notification to authorities 5.Control: if unsafe state of the target is controllable, then perform control function 6.Recover: recover from the unsafe event and modify rules/ profiles
9
(3) Technology: UbiComp? Targets {Physical items as well as electronic data (virtual items) that may have state and identity relations} Rules and profiles {Refer to and must consider both physical and virtual changes in state and resultant events} Monitor {Collection of events generated by different types of distributed sensors} Controller {Distributed and special purposed. Availability is not always guaranteed} Alarm {Must exploit different types of media for transmitting alerts. Media availabilities also change}
10
(4) Scenario = Logistics Goods transported between holding areas Origin requires regular, secure updates about status However, each holding area has different services available Too costly to integrate satellite communication in each item Different items have different protection objectives
11
Conclusions Theory: Abstract model for dynamic cooperative security system Model for automated configuration of collaborating security services, which dynamically change their availabilities Practice: Specific technology considered for instantiating theoretical models Cost factors for resource usage and communication choices were used to refine the theoretical models
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.