On the Modelling of Context-Aware Security for Mobile Devices

Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems a...

Full description

Bibliographic Details
Main Authors: Tomasz Zurek, Michail Mokkas, Bogdan Ksiezopolski
Format: Article
Language:English
Published: Hindawi Limited 2016-01-01
Series:Mobile Information Systems
Online Access:http://dx.doi.org/10.1155/2016/8743504
id doaj-2dd608ef3ee144209ffd6e6556a60832
record_format Article
spelling doaj-2dd608ef3ee144209ffd6e6556a608322021-07-02T07:01:30ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2016-01-01201610.1155/2016/87435048743504On the Modelling of Context-Aware Security for Mobile DevicesTomasz Zurek0Michail Mokkas1Bogdan Ksiezopolski2Institute of Computer Science, Maria Curie-Sklodowska University, Pl. M. Curie-Sklodowskiej 5, 20-031 Lublin, PolandPolish-Japanese Institute of Information Technology, Koszykowa 86, 02-008 Warsaw, PolandInstitute of Computer Science, Maria Curie-Sklodowska University, Pl. M. Curie-Sklodowskiej 5, 20-031 Lublin, PolandSecurity management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules’ eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices.http://dx.doi.org/10.1155/2016/8743504
collection DOAJ
language English
format Article
sources DOAJ
author Tomasz Zurek
Michail Mokkas
Bogdan Ksiezopolski
spellingShingle Tomasz Zurek
Michail Mokkas
Bogdan Ksiezopolski
On the Modelling of Context-Aware Security for Mobile Devices
Mobile Information Systems
author_facet Tomasz Zurek
Michail Mokkas
Bogdan Ksiezopolski
author_sort Tomasz Zurek
title On the Modelling of Context-Aware Security for Mobile Devices
title_short On the Modelling of Context-Aware Security for Mobile Devices
title_full On the Modelling of Context-Aware Security for Mobile Devices
title_fullStr On the Modelling of Context-Aware Security for Mobile Devices
title_full_unstemmed On the Modelling of Context-Aware Security for Mobile Devices
title_sort on the modelling of context-aware security for mobile devices
publisher Hindawi Limited
series Mobile Information Systems
issn 1574-017X
1875-905X
publishDate 2016-01-01
description Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules’ eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices.
url http://dx.doi.org/10.1155/2016/8743504
work_keys_str_mv AT tomaszzurek onthemodellingofcontextawaresecurityformobiledevices
AT michailmokkas onthemodellingofcontextawaresecurityformobiledevices
AT bogdanksiezopolski onthemodellingofcontextawaresecurityformobiledevices
_version_ 1721336562673778688