Download presentation
Presentation is loading. Please wait.
1
SECURE Application Scenarios Ciarán Bryce, Giovanna Di Marzo Serugendo Glasgow meeting, 5-6th September 2002
2
2 Selection criteria u Applications are targeted towards global computing u Use Cases u Applications scenarios: are being, or will be, implemented by a partner u Applications possess intricate trust relations involved äI.e., not simply a user trusting a super-user à la Unix u Applications are heterogeneous w.r.t. aspects of problem we are dealing with
3
3 Description u Informal Description u Actors: earn benefit u Principals: involved in scenario u Benefit: why actors take risk u Risk: measure of loss u Observation: basis for trust decision u Reputation, Recommendation: global opinion, and advice u Trust: who trusts who u Security Policy: how trust, and risk measures are exploited for access control decisions
4
4 Use Cases u Blackjack, Smart Spaces u Ad Hoc Network Routing u Restaurant u Coffee Machines u Distributed Post-its u On-line Auctions u Car Rental u Car Obstacle Avoidance u Medical Records u News Article u Amazon u P2P u Grid Computing
5
5 Application Scenarios u Overview: domain and description u Background: development context u Scenario: example of run of the scenario u Issues of Trust: Actors, Principals, …
6
6 Personalised Community Portal Agent Backbone Client Information Portal Internet Servers customer query e-mail agent query u Overview äPortal äCustomer query solved through an agent backbone u Actors äclients, producers, portal administrators, agent backbone providers
7
7 P2P Based Distributed File System u Overview äUsing peer-to-peer PC network to store backups äe.g., Chord file system u Actors: Publishers, Clients, Servers
8
8 PDA-based spontaneous networks u Business Fair äPDAs based recognition and information exchanges u Actors äVisitors
9
9 Smart Spaces u Distributed workspace for data sharing u Example application: äBlackjack u Actors äPlayers, space provider, ….. u …. u Any Volunteers ?
10
10 E-Purses on Mobile Devices u Overview äMobile telephones are “secure” computers they each have smartcards äBluetooth allows free data exchange Basis for micro-payment u Actors äUser, bank, bus company
11
11 Distributed Spam Filtering u E-mail filtering äSpam rejected on the basis of e-mail header äIP address, from, subject fields u Reject Spam mails on the basis of trust
12
12 Collaborative Information Sharing u Sharing of information based on trust (Cambridge) u PDA-based information exchange u Trust regarding information redistribution
13
13 Taxonomy u Applications Domains äBusiness äOffice äScientific äHealth äInformation Sharing äGames Network äTrust-Risk Model (?) äRecommendation- based äObservation-based äRisk-oriented äBenefit-oriented äTrust-based u Technologies äPDAs äVirtual Spaces äDecentralized Control äAgents äInternet Access/Web äPervasive
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.