5 research outputs found

    Interim research assessment 2003-2005 - Computer Science

    Get PDF
    This report primarily serves as a source of information for the 2007 Interim Research Assessment Committee for Computer Science at the three technical universities in the Netherlands. The report also provides information for others interested in our research activities

    A Risk And Trust Security Framework For The Pervasive Mobile Environment

    Get PDF
    A pervasive mobile computing environment is typically composed of multiple fixed and mobile entities that interact autonomously with each other with very little central control. Many of these interactions may occur between entities that have not interacted with each other previously. Conventional security models are inadequate for regulating access to data and services, especially when the identities of a dynamic and growing community of entities are not known in advance. In order to cope with this drawback, entities may rely on context data to make security and trust decisions. However, risk is introduced in this process due to the variability and uncertainty of context information. Moreover, by the time the decisions are made, the context data may have already changed and, in which case, the security decisions could become invalid.With this in mind, our goal is to develop mechanisms or models, to aid trust decision-making by an entity or agent (the truster), when the consequences of its decisions depend on context information from other agents (the trustees). To achieve this, in this dissertation, we have developed ContextTrust a framework to not only compute the risk associated with a context variable, but also to derive a trust measure for context data producing agents. To compute the context data risk, ContextTrust uses Monte Carlo based method to model the behavior of a context variable. Moreover, ContextTrust makes use of time series classifiers and other simple statistical measures to derive an entity trust value.We conducted empirical analyses to evaluate the performance of ContextTrust using two real life data sets. The evaluation results show that ContextTrust can be effective in helping entities render security decisions

    Architectures for Intra-Personal Network Communication

    No full text
    Personal Networks (PN) is a new concept related to pervasive computing with a strong user-focus view. The key to a successful PN realization is a general network architecture that is capable of bridging different current and future technologies and offers a homogeneous and clear view to the end-user. In this paper, we focus on forming a PN by connecting remote personal devices using infrastructure-based IP networks, including 3G networks and WLAN hotspots. One way is to upgrade the current access networks with new functionality to support PNs. Since many devices in PNs are mobile and battery powered, this may help them to achieve a faster service and to save energy. However, to deploy such functionality is not easy and may hamper the adoption of PNs altogether. Therefore, we propose an intra-PN communication architecture that will work over current IP networks. To discern the above proposal we also give a detailed picture of PN network architecture and infrastructure supported PNs. We believe that this will help the success of PNs
    corecore