Secure Systems Research Group - FAU Contexts and Context-based Access Control Model PhD Dissertation Progress Report Candidate: Alvaro E. Escobar Advisors:

Slides:



Advertisements
Similar presentations
Jeremy S. Bradbury, James R. Cordy, Juergen Dingel, Michel Wermelinger
Advertisements

An Adaptive Policy-Based Framework for Network Service Management Leonidas Lymberopoulos Emil Lupu Morris Sloman Department of Computing Imperial College.
Mobile applications Mobile applications have been a domain for recommendation –small display sizes and space limitations –naturally require.
Martin Wagner and Gudrun Klinker Augmented Reality Group Institut für Informatik Technische Universität München December 19, 2003.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Component-oriented approaches to context-aware systems – Monday 14 June The Contextor Infrastructure for Context-Aware Computing Gaëtan Rey, Joëlle.
Automated Analysis and Code Generation for Domain-Specific Models George Edwards Center for Systems and Software Engineering University of Southern California.
Distributed Systems Architectures
© Siemens AG 2001 Software & Systems Architectures - Mobile Computing Proposed Research Topics Cooperation between Siemens and UCB March 27, 2001 Visit.
Quality of Service in IN-home digital networks Alina Albu 23 October 2003.
27 September 1999 Crisis Management William L. Scherlis Carnegie Mellon University School of Computer Science.
Strategic Directions in Real- Time & Embedded Systems Aatash Patel 18 th September, 2001.
Intelligent Web Applications (Part 1) Course Introduction Vagan Terziyan AI Department, Kharkov National University of Radioelectronics / MIT Department,
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Secure Systems Research Group - FAU 1 SCADA Software Architecture Meha Garg Dept. of Computer Science and Engineering Florida Atlantic University Boca.
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Secure Systems Research Group - FAU Context Architectures Using Web Services PhD Candidate: Alvaro E. Escobar Advisors: Dr. Maria Petrie Dr. Eduardo Fernandez.
Context-Aware Middleware for Anytime, Anywhere Social Networks Dario Bottazzi, Rebecca Montanari, and Alessandra Toninelli University of Bologna IEEE Intelligent.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
Patterns for Location and Context-based access control
An Introduction to Software Architecture
The Architecture of Secure Systems Jim Alves-Foss Laboratory for Applied Logic Department of Computer Science University of Idaho By, Nagaashwini Katta.
Secure Systems Research Group - FAU Context Architectures Using Web Services Candidate: Alvaro E. Escobar Advisors: Dr. Maria Petrie Dr. Eduardo Fernandez.
Architecting Web Services Unit – II – PART - III.
Model-Driven Analysis Frameworks for Embedded Systems George Edwards USC Center for Systems and Software Engineering
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
Context: definition and specification. Leuven, 21 november 2003 Agenda Introduction Work method Context in literature  Definitions  Specifications Where.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Verification of behavioural elements of UML models using B Truong, Ninh-Thuan and Souquieres, Jeanine In Proceedings of the 2005 ACM Symposium on.
Secure Systems Research Group - FAU A Trust Model for Web Services Ph.D Dissertation Progress Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
Secure Systems Research Group - FAU Context Architectures Using Web Services Candidate: Alvaro E. Escobar Advisors: Dr. Maria Petrie Dr. Eduardo Fernandez.
Computing Ontology Part II. So far, We have seen the history of the ACM computing classification system – What have you observed? – What topics from CS2013.
FDT Foil no 1 On Methodology from Domain to System Descriptions by Rolv Bræk NTNU Workshop on Philosophy and Applicablitiy of Formal Languages Geneve 15.
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
Rational Unified Process Fundamentals Module 7: Process for e-Business Development Rational Unified Process Fundamentals Module 7: Process for e-Business.
Task 1.2 Context: definition and specification. Leuven, 14 oktober 2004 Outline Introduction Work method Context definition Context specification  Overview.
Secure Systems Research Group - FAU 1 A Trust Model for Web Services Ph.D Dissertation Progess Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
Page 1Wireless World Research Forum (WWRF) WWRF WG2 Service infrastructure of the wireless world  Chair: Prof. Radu Popescu-Zeletin, Fraunhofer FOKUS,
CoOL: A Context Ontology Language to Enable Contextual Interoperability Thomas Strang, Claudia Linnhoff-Popien, and Korbinian Frank German Aerospace Centor.
Csci 490 / Engr 596 Special Topics / Special Projects Software Design and Scala Programming Spring Semester 2010 Lecture Notes.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Secure Systems Research Group - FAU 1 WS-Reliability Pattern Ingrid Buckley Dept. of Computer Science and Engineering Florida Atlantic University Boca.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Seminar on Service Oriented Architecture Distributed Systems Architectural Models From Coulouris, 5 th Ed. SOA Seminar Coulouris 5Ed.1.
An Ontology-based Approach to Context Modeling and Reasoning in Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire INSA de Lyon,
Secure middleware patterns E.B.Fernandez. Middleware security Architectures have been studied and several patterns exist Security aspects have not been.
Computer Science and Engineering 1 Mobile Computing and Security.
Engr 691 Special Topics in Engineering Science Software Architecture Spring Semester 2004 Lecture Notes.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Wireless Communication & Mobile Programming 1 UNIT- 1 – MOBILECOMPUTINGINTRODUCTION Blog: aforajayshahnirma.wordpress.com.
Context-based Access Control
Context-Aware Middleware for Resource Management in the Wireless Internet US Lab 신현정.
Dr. Ir. Yeffry Handoko Putra
معرفی مجموعه‌ای از الگوهای فرآيند مخصوص نرم‌افزارهای بی‌درنگ
CGS 2545: Database Concepts Fall 2010
Preface to the special issue on context-aware recommender systems
OO Methodology OO Architecture.
يك مدل اعتماد توزيع‍شده براي محيطهاي محاسبات فراگير
Model-Driven Analysis Frameworks for Embedded Systems
Introduction to Agents
Agenda Why context-aware apps and Web Services?
THREE TIER MOBILE COMPUTING ARCHITECTURE
3rd Studierstube Workshop TU Wien
Automated Analysis and Code Generation for Domain-Specific Models
Recommendations in ubiquitous environments
Presentation transcript:

Secure Systems Research Group - FAU Contexts and Context-based Access Control Model PhD Dissertation Progress Report Candidate: Alvaro E. Escobar Advisors: Dr. Maria Petrie Dr. Eduardo Fernandez Department of Computer Science and Engineering Florida Atlantic University, Boca Raton FL. 12/15/2005

Secure Systems Research Group - FAU Agenda What is Context? Context Models What is Profile Profile Models Policy and Access Control Access Control Models Conclusions Future Work

Secure Systems Research Group - FAU What is Context? The set of facts and/or circumstances that surround a situation or event. [Google]. The location and identities of nearby people and objects and changes to those objects. [Sch95] The logical set of resources accessible to a client during a service session depending on several factors, such as client location, access device capabilities, management policies of the access locality, subscribed services, user preferences, and level of trust. [Bel03] [Cor04] The composition of context elements which belong to either physical or organizational contexts. The physical context identifies spaces, locations and devices. The organizational context includes roles, groups, calendars, activities, processes and applications. [Kir05] Is a process of interacting with an ever-changing environment composed of reconfigurable, mobile and distributed resources. [Cou05]. Is a distinction between the notion of an instant snapshot of observable variables (a situation) and the composition of those observable variables over time (a context) [Cou02].

Secure Systems Research Group - FAU Context Models Corradi’s Context and Access Control Model

Secure Systems Research Group - FAU Context Models Kirsch-Pinheiro’s Class model for Context – Part 1 (Taken from [Kir05])

Secure Systems Research Group - FAU Context Models Kirsch-Pinheiro’s Class model for Context – Part 2 (Taken from [Kir05])

Secure Systems Research Group - FAU Context Models Figure 4 Coutaz’s Class model for Context

Secure Systems Research Group - FAU What is Context made of? Critical sub-processes of a context are: –Collect the set of locally available resources. (resources potentially visible in the user’s physical location) –Filter the visible resources through access control policies. (refined potentially visible resources) –Map them onto the users’ goals, preferences and activities described by profiles. (refine resources even more) –Resources vs Observables. (What about time?)

Secure Systems Research Group - FAU What is a Profile? Profiles represent characteristics, capabilities, and requirements of users, devices, and service components. [Bel03]. User profiles: personal preferences, interests, privacy requirements, and subscribed services. Device profiles: hardware/software characteristics of devices. Service component profiles: service interface, properties for binding management decisions. Site profiles: All resources available at one location.

Secure Systems Research Group - FAU What is a Profile? Descriptions of user’s potential contexts and filtering rules that describe the user’s preferences, given a context [Kir05] Comprehensive Structured Context Profiles (CSCP); based on the Resource Description Framework (RDF) [Buc04],[[Bra01]

Secure Systems Research Group - FAU Profile Models Corradi’s Profile Model

Secure Systems Research Group - FAU Profile Models Kirsch-Pinheiro Class model for a General Profile [Kir05]

Secure Systems Research Group - FAU Policy and Access Control  Policies express the choices of a ruling system behavior, in terms of the actions subjects can/must operate upon resources. [Bel03] Access control policies specify the actions subjects are allowed to perform on resources depending on various types of conditions, e.g., subject identity and resource state; Obligation policies define the actions subjects must perform on resources when specified conditions occur.  The automatic qualification of accessible resources depends on the client context, the current enforced management policies and the user’s personal preferences (profiles). [Cor04]

Secure Systems Research Group - FAU Access Control Model Corradi’s Access Control Model

Secure Systems Research Group - FAU Unified Context-based Access Control Model. Context and CBAC Model

Secure Systems Research Group - FAU Conclusions Context is a fundamental concept in mobile systems. Different researchers use different variations of context. We have tried here to unify and clarify this concept from three definitions of context. We produced a model that summarizes their most relevant aspects. This unified model can be expressed as a pattern and can be used as a guideline for the design of mobile systems.

Secure Systems Research Group - FAU Future Work Work on the pattern model and characteristics. Paper submission for International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN06) - March 15-16, 2006, Miami FL. Context-Aware Web Services Distributed and Parallel Databases Journal - Submission deadline: March 15, AMCIS Minitrack on Mobile Services - Submission deadline: March 1, Dissertation document completed by end of Summer ’06.

Secure Systems Research Group - FAU Contexts and Context-based Access Control Model References: –[Bel03] P. Bellavista, A. Corradi, R. Montanari, C. Stefanelli, “Context-Aware Middleware for Resource Management in the Wireless Internet”, IEEE Transactions on Software Engineering. Vol. 29, No. 12, December Page –[Cor04] A. Corradi, R. Montanari, D. Tibaldi, “Context-Based Access Control Management in Ubiquitous Environments”, Network Computing and Applications, Proceeding of the Third IEEE International Symposium on (NCA'04), August 30 - September 01, 2004, Boston, MA. –[Cou05] J. Coutaz, J. L. Crowley, S. Dobson & D. Garlan. “Context is key”. Communications of the ACM. March 2005/Vol. 48, No. 3. Page 49. –[Cou02] J. Coutaz and G. Rey. “Foundations for a theory of contextors”. Computer Aided Design of User Interfaces, Springer Verlag, –[Cro02] J. Crowley, J. Coutaz, G. Rey, and P. Reignier. “Perceptual components for context-aware computing”. Proceedings of the Fourth International Conference of Ubiquitous Computing, (Göteburg, Sweden, Sept./Oct. 2002). Springer, 117–134. –[Fer05] E. B. Fernandez, M. M. Larrondo-Petrie, T. Sorgente, and M. VanHilst, "UML as a generalized access control model ". Florida Atlantic University. –[Kir05] M. Kirsch-Pinheiro, M. Villanova-Oliver, J. Gensel, H. Martin. “Context-Aware Filtering for Collaborative Web Systems: Adapting the Awareness Information to the User’s Context” 2005 ACM Symposium on Applied Computing. SAC’05, March 13-17, 2005, Santa Fe, New Mexico, USA. –[Lem04] T. Lemlouma, N. Layaïda, Context-aware adaptation for mobile devices. Proceedings of the IEEE International Conference on Mobile Data Management (Berkeley, CA, USA, January 19-22, 2004). IEEE, –[Mon03] R. Montanari, P. Bellavista, A. Corradi, C.Stefanelli, “Dynamic Binding in Mobile Applications: a Middleware Approach”, IEEE Internet Computing, Special Issue on “Mobile Applications”, Vol. 7, No. 2, March/April –[Sch95] W. N. Schilit. “A System Architecture for Context-Aware Mobile Computing”. PhD thesis dissertation. Columbia University, 1995.