70,756 research outputs found

    Benefits of Location-Based Access Control:A Literature Study

    Get PDF
    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been investigated thoroughly. To this end, we perform a structured literature review, and examine the goals that LBAC can potentially fulfill, \ud the specific LBAC systems that realize these goals and the context on which LBAC depends. Our paper has four main contributions:\ud first we propose a theoretical framework for LBAC evaluation, based on goals, systems and context. Second, we formulate and apply criteria for evaluating the usefulness of an LBAC system. Third, we identify four usage scenarios for LBAC: open areas and systems, hospitals, enterprises, and finally data centers and military facilities. Fourth, we propose directions for future research:\ud (i) assessing the tradeoffs between location-based, physical and logical access control, (ii) improving the transparency of LBAC decision making, and \ud (iii) formulating design criteria for facilities and working environments for optimal LBAC usage

    Talking to the Empowered Consumer Dealing with the Shift of Power

    Get PDF
    The concept of the empowered consumer cannot be considered as a field of exact scientific research yet. Nevertheless, it has become part of scholars’ interest and gains more and more importance in the research of organisational relationships with customers. It is suggested that two influencing criteria are especially at the forefront: The emergence of the Internet, which effected that barriers to collect and to disseminate information across boundaries were decisively reduced. As a consequence consumers could organise globally and collect and exchange information and experiences about organisations and their products. Furthermore, flexible interactivity between companies and consumers, but particularly from consumers to consumers enable direct interaction changing many previously established rules of doing business. Due to these new opportunities new business models developed and the proposition is that intangible values such as reputation gained even more importance and influence tangible outcomes. Suggestions are that 1.), this concept links communication, corporate behaviour and legitimacy of activities influencing reputation as a driver of value. 2.), reputation as a corporate asset can be managed but it is beyond the pure control of an organisation. 3.), reputation is part of public perception, which an organisation has to build, maintain and expand depending on communicative abilities and willingness to accept consumers as a centre of power. The following discussion will present Grunig et al.’s communication model explaining changed organisational challenges. It is put forward as a framework for marketing for times in which online opportunities added to the earlier b2b and b2c models c2c and P2P considerations and architectures. The annual studies of the market research institute puls undertaking regular representative research among German consumers since November 2005 will present evidence for the relationship of improved prices, which may be achieved, and the perception a firm possesses. This paper deals mostly with German examples and data, but the hypothesis is that a) the general situation in other Western countries is alike, but needs b) specific additional research, since cultural differences are expected to have a considerable influence, especially when criteria such as individualist and collectivist organisation of society and high and low context communication styles are involved. Hence, the results of the same study in different countries are therefore expected to present some variation. Additionally, the Cluetrain Manifesto challenges corporate behaviour of those companies still believing to have the ability to control information disseminated by and written about it. Examples provided will support the hypothesis that powerful consumers may have significant impact on organisational behaviour, decision-making and outcomes. Keywords: Empowered Consumer Concept, Symmetric Two-way communication, Reputation, c2c, P2

    Quality of Information in Mobile Crowdsensing: Survey and Research Challenges

    Full text link
    Smartphones have become the most pervasive devices in people's lives, and are clearly transforming the way we live and perceive technology. Today's smartphones benefit from almost ubiquitous Internet connectivity and come equipped with a plethora of inexpensive yet powerful embedded sensors, such as accelerometer, gyroscope, microphone, and camera. This unique combination has enabled revolutionary applications based on the mobile crowdsensing paradigm, such as real-time road traffic monitoring, air and noise pollution, crime control, and wildlife monitoring, just to name a few. Differently from prior sensing paradigms, humans are now the primary actors of the sensing process, since they become fundamental in retrieving reliable and up-to-date information about the event being monitored. As humans may behave unreliably or maliciously, assessing and guaranteeing Quality of Information (QoI) becomes more important than ever. In this paper, we provide a new framework for defining and enforcing the QoI in mobile crowdsensing, and analyze in depth the current state-of-the-art on the topic. We also outline novel research challenges, along with possible directions of future work.Comment: To appear in ACM Transactions on Sensor Networks (TOSN

    Detecting and Refactoring Operational Smells within the Domain Name System

    Full text link
    The Domain Name System (DNS) is one of the most important components of the Internet infrastructure. DNS relies on a delegation-based architecture, where resolution of names to their IP addresses requires resolving the names of the servers responsible for those names. The recursive structures of the inter dependencies that exist between name servers associated with each zone are called dependency graphs. System administrators' operational decisions have far reaching effects on the DNSs qualities. They need to be soundly made to create a balance between the availability, security and resilience of the system. We utilize dependency graphs to identify, detect and catalogue operational bad smells. Our method deals with smells on a high-level of abstraction using a consistent taxonomy and reusable vocabulary, defined by a DNS Operational Model. The method will be used to build a diagnostic advisory tool that will detect configuration changes that might decrease the robustness or security posture of domain names before they become into production.Comment: In Proceedings GaM 2015, arXiv:1504.0244

    Context modeling and constraints binding in web service business processes

    Get PDF
    Context awareness is a principle used in pervasive services applications to enhance their exibility and adaptability to changing conditions and dynamic environments. Ontologies provide a suitable framework for context modeling and reasoning. We develop a context model for executable business processes { captured as an ontology for the web services domain. A web service description is attached to a service context profile, which is bound to the context ontology. Context instances can be generated dynamically at services runtime and are bound to context constraint services. Constraint services facilitate both setting up constraint properties and constraint checkers, which determine the dynamic validity of context instances. Data collectors focus on capturing context instances. Runtime integration of both constraint services and data collectors permit the business process to achieve dynamic business goals

    A User-Focused Reference Model for Wireless Systems Beyond 3G

    Get PDF
    This whitepaper describes a proposal from Working Group 1, the Human Perspective of the Wireless World, for a user-focused reference model for systems beyond 3G. The general structure of the proposed model involves two "planes": the Value Plane and the Capability Plane. The characteristics of these planes are discussed in detail and an example application of the model to a specific scenario for the wireless world is provided
    corecore