60 research outputs found

    Context-aware Authorization in Highly Dynamic Environments

    Get PDF
    Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user needs. On the other hand, standard access control trusts users once they have authenticated, despite the fact that they may reach unauthorized contexts. We analyse how taking into account dynamic information like context in the authorization subsystem can improve security, and how this new access control applies to interaction patterns, like messaging or eventing. We experiment and validate our approach using context as an authorization factor for eventing in Web service for device (like UPnP or DPWS), in smart home security

    Context-sensitive authorization for asynchronous communications

    Get PDF
    Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trust users once they have authenticated, despite the fact that they may reach unauthorized situations. We analyse how dynamic information can be used to improve security in the authorization process, especially in the case of asynchronous communications, like messaging or eventing. We experiment and validate our approach using context as an authorization factor for eventing in Web service for device (like UPnP or DPWS)

    Context-Sensitive Authorization in Interaction Patterns

    Get PDF
    Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trust users once they have authenticated, despite the fact that they may reach unauthorized situations. We analyse how dynamic information can be used to improve security in the authorization process, and what are the implications when applied to interaction patterns. We experiment and validate our approach using context as an authorization factor for eventing in Web service for device (like UPnP or DPWS)

    Net-Exchange parameterization of infrared radiative transfers in Venus' atmosphere

    Get PDF
    International audienceThermal radiation within Venus atmosphere is analyzed in close details. Prominent features are identified, which are then used to design a parameterization (a highly simplified and yet accurate enough model) to be used in General Circulation Models. The analysis is based on a net exchange formulation, using a set of gaseous and cloud optical data chosen among available referenced data. The accuracy of the proposed parameterization methodology is controlled against Monte Carlo simulations, assuming that the optical data are exact. Then, the accuracy level corresponding to our present optical data choice is discussed by comparison with available observations, concentrating on the most unknown aspects of Venus thermal radiation, namely the deep atmosphere opacity and the cloud composition and structure

    WComp, Middleware for Ubiquitous Computing and System Focused Adaptation

    Get PDF
    International audienceUbiquitous computing relies on computers present everywhere, at any times and in any things. Indeed with recent years advance in mobile communication technologies and the miniaturization of computer hardware, processing units are becoming invisible and a part of the environment. Middlewares for ubiquitous computing have to manage three main features specific to their environment: devices’ mobility, devices’ heterogeneity and environment’s dynamicity. The devices’ mobility, due to motion of users and their associated devices, forbids to assume that entities are known and will always be available. The second concept, entity’s heterogeneity, outlines the diversity between devices’ capabilities and functionalities provided by new smart objects. Finally, the environment high dynamicity illustrates the ubiquitous world entropy with the appearance and disappearance of devices. Devices used to create applications are thus unknown before discovering them. Then, ubiquitous computing must deal with such a dynamic software environment (called software infrastructure afterwards). As a result, future ubiquitous computing architectures must take into account those three constraints to solve ubiquitous computing challenges.Our model of middleware WComp is based on three parts: a software infrastructure, a service composition architecture, and a compositional adaptation mechanism

    Contexte et sécurité dans les intergiciels d'informatique ambiante

    No full text
    En informatique ambiante, le contexte joue un rĂŽle capital. Les applications informatiques Ă©tendent leurs interactions avec 'environnement: de nouvelles entrĂ©es et sorties sont utilisĂ©es, telles que des capteurs et d'autres dispositifs mobiles d'interaction avec l'environnement rĂ©el et physique. Les intergiciels, crĂ©Ă©s pour masquer la complexitĂ© des couches infĂ©rieures en informatique distribuĂ©e, se voient alors chargĂ©s de nouvelles prĂ©occupations, comme la prise en compte du contexte, l'adaptation des applications ou la sĂ©curitĂ©. Une reprĂ©sentation en couches intergicielles de ces prĂ©occupations ne permet pas d'exprimer toutes leurs interdĂ©pendances. En informatique ambiante, la distribution est nĂ©cessaire pour obtenir les informations contextuelles, mais il est aussi nĂ©cessaire de prendre en compte le contexte dans la distribution, par exemple pour limiter les interactions aux entitĂ©s d'un contexte dĂ©fini. De plus, les interactions asynchrones utilisĂ©es dans les nouveaux environnements informatiques nĂ©cessitent une attention particuliĂšre lors de la prise en compte du contexte. De mĂȘme, la sĂ©curitĂ© intervient Ă  la fois dans les couches intergicielles de distribution et de prise en compte du contexte. Dans cette thĂšse nous prĂ©sentons un modĂšle de prise en compte du contexte dans la sĂ©curitĂ© et la distribution. Le contrĂŽle d'accĂšs doit Ă©voluer pour intĂ©grer une autorisation dynamique et rĂ©active, basĂ©e sur des informations liĂ©es Ă  l'environnement et plus simplement sur l'authentification des entitĂ©s. Les informations contextuelles Ă©voluent suivant une dynamique indĂ©pendante des applications. Il est aussi nĂ©cessaire de dĂ©tecter les changements de contexte pour rĂ©Ă©valuer l'autorisation. Nous expĂ©rimentons cette prise en compte du contexte dans le contrĂŽle des interactions avec la plate-forme expĂ©rimentale WComp, issue du modĂšle SLCA/AA (Service Lightweight Component Architecture / Aspects of Assembly). SLCA permet de concevoir des intergiciels et des applications dynamiques dont le dĂ©coupage fonctionnel n'est pas traduit en couches, mais par un entrelacement de fonctionnalitĂ©s. Les aspects d'assemblage sont un mĂ©canisme d'adaptation compositionnelle d'assemblages de composants. Nous les utilisons pour exprimer nos prĂ©occupations non-fonctionnelles et pour les composer avec les applications existantes de façon dĂ©terministe et rĂ©active. Nous introduisons pour cela des rĂšgles de contrĂŽle d'interactions contextualisĂ©es. L'intergiciel permet ainsi d'adapter en fonction du contexte nos prĂ©occupations non-fonctionnelles et le comportement de l'application.In ubiquitous computing, context is key. Computer applications are extending their interactions with the environment: new inputs and outputs are used, such as sensors and other mobile devices interacting with the physical environment. Middlewares, created in distributed computing to hide the complexity of lower layers, are then loaded with new concerns, such as taking into account the context, adaptation of applications or security. A middleware layer representation of these concerns cannot express all heir interdependencies. In pervasive computing, distribution is required to obtain contextual information, but it is also necessary to take into account the context in distribution, for example to restrict interactions between entities in a defined context. In addition,asynchronous interactions used in those new environments require special attention when taking into account the context. Similarly, security is involved both in the middleware layers of distribution and context-sensitivity. In this thesis we present a model taking into account the context both in security and distribution. Access control must evolve to incorporate a dynamic and reactive authorization, based on information related to environment or simply on the authentication information of entities. Contextual information evolve with their own dynamic, independent of applications. It is also necessary to detect context changes to reenforce the authorization. We are experimenting this context-awareness targetting interaction control with the experimental framework WComp, derived from the SLCA/AA (Service Lightweight Component Architecture / Aspects of Assembly) model. SLCA allows to create dynamic middlewares and applications for which functional cutting is not translated into layers but into an interleaving of functionalities. Aspects of assembly are a mechanism for compositional adaptation of assemblies of components. We use them to express our non-functional concerns and to compose them with existing applications in a deterministic and reactive manner. For this purpose, we introduce context-aware interaction control rules. The middleware thus allows to adapt, according to context, our non-functional concerns and the behavior of the application.NICE-BU Sciences (060882101) / SudocSudocFranceF
    • 

    corecore