On the Modelling of Context-Aware Security for Mobile Devices
Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems a...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2016-01-01
|
Series: | Mobile Information Systems |
Online Access: | http://dx.doi.org/10.1155/2016/8743504 |
id |
doaj-2dd608ef3ee144209ffd6e6556a60832 |
---|---|
record_format |
Article |
spelling |
doaj-2dd608ef3ee144209ffd6e6556a608322021-07-02T07:01:30ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2016-01-01201610.1155/2016/87435048743504On the Modelling of Context-Aware Security for Mobile DevicesTomasz Zurek0Michail Mokkas1Bogdan Ksiezopolski2Institute of Computer Science, Maria Curie-Sklodowska University, Pl. M. Curie-Sklodowskiej 5, 20-031 Lublin, PolandPolish-Japanese Institute of Information Technology, Koszykowa 86, 02-008 Warsaw, PolandInstitute of Computer Science, Maria Curie-Sklodowska University, Pl. M. Curie-Sklodowskiej 5, 20-031 Lublin, PolandSecurity management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules’ eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices.http://dx.doi.org/10.1155/2016/8743504 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Tomasz Zurek Michail Mokkas Bogdan Ksiezopolski |
spellingShingle |
Tomasz Zurek Michail Mokkas Bogdan Ksiezopolski On the Modelling of Context-Aware Security for Mobile Devices Mobile Information Systems |
author_facet |
Tomasz Zurek Michail Mokkas Bogdan Ksiezopolski |
author_sort |
Tomasz Zurek |
title |
On the Modelling of Context-Aware Security for Mobile Devices |
title_short |
On the Modelling of Context-Aware Security for Mobile Devices |
title_full |
On the Modelling of Context-Aware Security for Mobile Devices |
title_fullStr |
On the Modelling of Context-Aware Security for Mobile Devices |
title_full_unstemmed |
On the Modelling of Context-Aware Security for Mobile Devices |
title_sort |
on the modelling of context-aware security for mobile devices |
publisher |
Hindawi Limited |
series |
Mobile Information Systems |
issn |
1574-017X 1875-905X |
publishDate |
2016-01-01 |
description |
Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules’ eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices. |
url |
http://dx.doi.org/10.1155/2016/8743504 |
work_keys_str_mv |
AT tomaszzurek onthemodellingofcontextawaresecurityformobiledevices AT michailmokkas onthemodellingofcontextawaresecurityformobiledevices AT bogdanksiezopolski onthemodellingofcontextawaresecurityformobiledevices |
_version_ |
1721336562673778688 |