2007
DOI: 10.1007/978-3-540-76652-0_13
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Confidence in Context for Context-Aware Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 25 publications
0
11
0
Order By: Relevance
“…The framework, a first version of which was already presented, realizes the control structure automating the entire process of reconfiguration of security subsystems based on trustworthy contextual information [38]. Modularity and extensibility are achieved using a component-based architecture to introduce flexibility in each step of reconfiguration.…”
Section: Discussionmentioning
confidence: 99%
“…The framework, a first version of which was already presented, realizes the control structure automating the entire process of reconfiguration of security subsystems based on trustworthy contextual information [38]. Modularity and extensibility are achieved using a component-based architecture to introduce flexibility in each step of reconfiguration.…”
Section: Discussionmentioning
confidence: 99%
“…In addition, they propose to apply a new policy without checking if the nodes can handle it, which may be harmful to the network. Lacoste et al [8] propose an approach that uses context-awareness for adaptive security. The context knowledge is combined with confidence and reputation metadata.…”
Section: Related Workmentioning
confidence: 99%
“…The Context Manager is responsible for collecting information that influences the system (or the application) through appropriate context sensors, for aggregating semantically these information, and for notifying the Adaptation Planning Manager component of relevant context changes. Context information are related to computing resources, environment state, or user preferences, but may also include security-relevant meta-data, describing the authenticity, secrecy, or integrity of the underlying context data [17].…”
Section: Overall Architecturementioning
confidence: 99%