The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004.
DOI: 10.1109/mobiq.2004.1331736
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing policies in pervasive environments

Abstract: This paper presents an architecture and a proof of concept implementation of a security infrastructure for mobile devices in an infrastructure based pervasive environment. The security infrastructure primarily consists of two parts, the policy engine and the policy enforcement mechanism. Each mobile device within a pervasive environment is equipped with its own policy enforcement mechanism and is responsible for protecting its resources. A mobile device consults the nearest policy server, notifies its current … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…1) User policy editor: As described by [20], policies may be enforced indefinitely or for a certain time period based on a policy certificate validity period or a combination of timeout or loss of contact with an assigned network. However, the user has the option of modifying or adding rules to the policy through the interface shown in Figure 11.…”
Section: Rule Specificationsmentioning
confidence: 99%
“…1) User policy editor: As described by [20], policies may be enforced indefinitely or for a certain time period based on a policy certificate validity period or a combination of timeout or loss of contact with an assigned network. However, the user has the option of modifying or adding rules to the policy through the interface shown in Figure 11.…”
Section: Rule Specificationsmentioning
confidence: 99%
“…Examples for policy frameworks based on semantic policy representation are KAoS [18] and Rein(n) [7,5]. Rein(n) is based on rules written in the RDF-based rule language Notation3 1 and has been used in [11] to implement a policy-controlled pervasive system. KAoS represents even the policy structure itself in description logic (i. e. in DAML, the antecedent of OWL) and makes use of the Java Theorem Prover 2 in order to integrate rules and variables which are not supported by plain DAML / OWL.…”
Section: Related Workmentioning
confidence: 99%
“…Since proactive computing has put emphasis on humansupervised automatic operations rather than human-computer interactions, it is therefore rational and necessary to have a specific part in the UbicKids architecture to manage the corresponding supervision information that may include task, plan, policy, rule and background knowledge [3], [18]. Such information is cataloged as some kind of contexts by some researchers.…”
Section: A General System Architecturementioning
confidence: 99%