115 research outputs found

    Context? Yes, but to whom?

    Get PDF

    User-Centric Adaptive Access Control and Resource Configuration for Ubiquitous Computing Environments

    Get PDF
    Provision of adaptive access control is key to allowing users harness the full potential of ubiquitous computing environments. In this paper, we introduce the M-Zones Access Control (MAC) process, which provides user-centric attribute-based access control, together with automatic reconfiguration of resources in response to the changes in the set of users physically present in the environment. User control is realised via user-specified policies, which are analysed in tandem with system policies and policies of other users, whenever events occur that require policy decisions and associated configuration operations. In such a system users' policies may habitually conflict with system policies, or indeed other users' policies; thus, policy conflict detection and resolution is a critical issue. To address this we describe a conflict detection/resolution method based on a policy precedence scheme. To illustrate the operation of the MAC process and its conflict detection/resolution method, we discuss its realisation in a test bed emulating an office-based ubiquitous computing environment

    Investigating the Applicability of Mobile IP and Cellular IP for Roaming in Smart Environments

    Get PDF
    Increased research and development in the field of ubiquitous computing, and in particular smart spaces, has heightened the need for a comprehensive mobility solution. Existing mobility protocols are often categorised as either macro or micro mobility but few, if any, bridge the divide between the two. Mobile IP is at present the IETF proposed standard for delivery of IP packets to mobile devices. However, as a macro mobility protocol, it does not adequately support data delivery to mobile devices that regularly roam within local networks. Cellular IP, a more recent development in mobility, falls under the banner of micro mobility and as such delivers a number of benefits that a macro mobility protocol alone could not. This paper describes a complete mobility architecture accomplished by integrating Mobile IP with Cellular IP and continues by addressing the suitability of this integration for supporting roaming in smart environments

    A Discussion on Policy-based Management using Context Mobility in Ad-Hoc Networking

    Get PDF
    Much of the current research in the field of Information and Communication Technology has focused on pervasive and ubiquitous computing. It is an environment where converging technologies and devices are distributed, highly mobile and often intelligent. This discussion paper looks at using Policy Based Network Management (PBNM) with Context to simplify configuration management for mobile or ad hoc networks

    On the use of Policy Based Management for Pervasive m-Government Services

    Get PDF
    This paper discusses service discovery, composition and adaptation, illustrating their usefulness in pervasive mobile environments in which a multitude of services are available to users. It addresses how service discovery and composition, incorporating personalisation and context awareness, can provide focused sets of services tailored to a user's individual needs, shielding users from the potentially bewildering range of offered services. It is argued that because users' needs will be constantly evolving, these service sets must also continually adapt to changing requirements. The Pervasive Services Platform developed by the EU FP6 integrated project Daidalos is described and a usage scenario for it that demonstrates how service discovery, composition and adaptation can be successfully integrated is outline

    End-to-End Model Driven Policy Based Network Management

    Get PDF
    The continued movement towards converged networks changes the focus to building application services that enable customers to move between different types of service providers based on their needs. Policy management becomes paramount for the rapid deployment and management of these application services. This paper presents the concept of a policy continuum and discusses the importance of modelling and natural languages in the presence of the policy continuum, resulting in a novel architecture suitable for autonomic computing

    Context-Driven, User-Centric Access Control for Smart Spaces

    Get PDF
    In this paper, we describe a user-centric access control process for devices and services in smart space environments. The M-Zones Access Control (MAC) Process is driven by context information relating to the activities of the users present in a smart space, and by user-defined policies reflecting these users' preferences. As well as dynamically assigning access rights in response to context changes, the process provides for automatic reconfiguration of resources in order to protect a user's privacy as other users enter/leave his/her vicinity. To illustrate the implementation of the process we discuss its realisation in a test bed emulating an office-based smart space

    An architecture for User-centric Management of Intelligent Environments

    Get PDF
    Ubiquitous computing environments are intelligent environments that have a wide array of embedded sensors and other artefacts that provide information regarding the current state of the physical environment. Utilisation of such information, known as context information has the potential to alter the natural surroundings of users in order to adapt the environment to suit the user's needs and assist in their tasks. These alterations in the environment should occur both transparently and seamlessly in order to minimise the impact on user's attention in such a way that the user's focus is not shifted from the task at hand. Satisfying user requirements in this manner, particularly in an environment that is so complex and dynamic raises a multitude of challenges. It is our belief that these challenges can be attributed to three distinct domains, namely management of personal information and management of context information combined with policy based management system. In the proposed paper we describe a management architecture for these intelligent environments that, through coordinated invocation of system and user policies triggered through the analysis of context information, taking into account business goals, can achieve a balance between user's desires and intentions while upholding system constraints

    Ontology Based Policy Mobility for Pervasive Computing

    Get PDF
    The array of devices, networks and resources available in pervasive computing environments, or smart spaces, will require effective self-management systems controlled via user-level policies. However, the local nature of smart spaces means that they present a potentially huge increase in the number of and nature of management domains, e.g. representing individual homes, shops, businesses, schools, hospitals etc. However, differences in local domain models and local resource models means that policies relevant to one smart space will often use different semantics for subject and target objects compared to other pervasive computing domains. To allow users to capture personal preferences in terms of policies that can be consistently applied as they roam between smart spaces, the semantic interoperability problem resulting from different models for policy subjects and targets must be overcome. In this paper we present a framework where the use of ontology-based semantics for policy elements allows dynamic ontology mapping capabilities to support policy mobility. We demonstrate its operation with a case study showing policy mobility in a policy-driven smart space management system
    corecore