Enforcing policies in pervasive environments

被引:0
|
作者
Patwardhan, A [1 ]
Korolev, V [1 ]
Kagal, L [1 ]
Joshi, A [1 ]
机构
[1] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an architecture and a proof of concept implementation of a security infrastructure for mobile devices in an infrastructure based pervasive environment. The security infrastructure primarily consists of two parts, the policy engine and the policy enforcement mechanism. Each mobile device within a pervasive environment is equipped with its own policy enforcement mechanism and is responsible for protecting its resources. A mobile device consults the nearest policy server notifies its current state including its present user network presence, other accessible devices and location information if available. Using this information the policy server queries the "Rei" engine to dynamically create a policy certificate and issues it to the requesting device. The system wide policy is described in a semantic language "Rei", a lightweight and extensible language which is able to express comprehensive policies using domain specific information. The "Rei" policy engine is able to dynamically decide what rights, prohibitions, obligations, dispensations an actor has on the domain actions. A policy certificate is created and issued to the device. The policy certificate contains a set of granted permissions and a validity period and scope within which the permissions are valid. The policy certificate can be revoked by the policy enforcer based on expiration of the validity period or a combination of timeout, loss of contact with an assigned network.
引用
收藏
页码:299 / 308
页数:10
相关论文
共 50 条
  • [21] Enforcing DRM policies across applications
    Dept. of Computer Science, Vrije Universiteit, 1081 HV Amsterdam, Netherlands
    不详
    Proc ACM Conf Computer Commun Secur, (87-94):
  • [22] Enforcing Multitenancy for Cloud Computing Environments
    Fiaidhi, Jinan
    Bojanova, Irena
    Zhang, Jia
    Zhang, Liang-Jie
    IT PROFESSIONAL, 2012, 14 (01) : 16 - 18
  • [23] Coordination in pervasive computing environments
    Ferscha, A
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 3 - 9
  • [24] SoCQ: a Framework for Pervasive Environments
    Gripay, Yann
    Laforest, Frederique
    Petit, Jean-Marc
    2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 154 - 159
  • [25] Positioning support in pervasive environments
    Scuturici, Vasile-Marian
    Ejigu, Dejene
    INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2006, : 19 - +
  • [26] Resource discovery for pervasive environments
    Rakotonirainy, A
    Groves, G
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2002: COOPLS, DOA, AND ODBASE, 2002, 2519 : 866 - 883
  • [27] Coordination of Knowledge in Pervasive Environments
    Bortenschlager, Manfred
    Nixon, Lyndon
    Tolksdorf, Robert
    Simperl, Elena
    17TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURES FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2008, : 43 - +
  • [28] On Modeling for Pervasive Computing Environments
    Campiolo, Rodrigo
    Cremer, Vivian
    Sobral, Joao Bosco M.
    MSWIM'07: PROCEEDINGS OF THE TENTH ACM SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2007, : 240 - 243
  • [29] Preserving anonymity on pervasive environments
    Pareschi, Linda
    Riboni, Daniele
    IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 74 - 75
  • [30] Coordinating knowledge in pervasive environments
    Nixon, Lyndon J. B.
    Tolksdorf, Robert
    Wood, Alan
    Menezes, Ronaldo
    WET ICE 2007: 16TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2007, : 74 - 79