The wide adoption of handled devices and remote ser-vices arises a number of security problems for users and services providers. The ubiquitous (pervasive) nature of such applications has brought new security vulnerabil-ities, and security in pervasive computing is thus, still a hot topic. Context-based security is an emerging ap-proach for modeling adaptive security solutions based on the context of use of the system. Our contribution aims at presenting a new model for specifying context-based security levels. This approach is based on contex-tual graphs and relies on a set of contextual information collected from the system and user’s environments
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Abstract. The integration of physical systems and processes with net-worked computing has led to the...
International audienceSecurity is top priority for pervasive applications, for which the number of r...
Abstract. Context-based security is an approach for modeling adaptive security solutions based on th...
The openness and heterogeneity of next generation communication networks are now highlighting more s...
Abstract. The openness and heterogeneity of next generation communication networks are now highlight...
International audienceIn this paper, we present a formal contextual security model for pervasive com...
International audienceThe successful deployment of a security policy is closely related not only to ...
AbstractRecent research in security shows a real need for contextual information in building highly ...
The Internet has proven to be the most convenient and demanding facility for various types of busine...
The design of security-critical pervasive systems is challenging due to that security constraints ar...
Strong security for mobile devices plays an increasingly important role in protecting sensitive data...
International audienceSecuring the access to a server, guaranteeing a certain level of protection ov...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Abstract. The integration of physical systems and processes with net-worked computing has led to the...
International audienceSecurity is top priority for pervasive applications, for which the number of r...
Abstract. Context-based security is an approach for modeling adaptive security solutions based on th...
The openness and heterogeneity of next generation communication networks are now highlighting more s...
Abstract. The openness and heterogeneity of next generation communication networks are now highlight...
International audienceIn this paper, we present a formal contextual security model for pervasive com...
International audienceThe successful deployment of a security policy is closely related not only to ...
AbstractRecent research in security shows a real need for contextual information in building highly ...
The Internet has proven to be the most convenient and demanding facility for various types of busine...
The design of security-critical pervasive systems is challenging due to that security constraints ar...
Strong security for mobile devices plays an increasingly important role in protecting sensitive data...
International audienceSecuring the access to a server, guaranteeing a certain level of protection ov...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Abstract. The integration of physical systems and processes with net-worked computing has led to the...