Support for situation awareness in trustworthy ubiquitous computing application software

Due to the dynamic and ephemeral nature of ubiquitous computing (ubicomp) environments, it is especially important that the application software in ubicomp environments is trustworthy. In order to have trustworthy application software in ubicomp environments, situation‐awareness (SAW) in the application software is needed to enforce flexible security policies and detect violations of security policies. In this paper, an approach is presented to provide development and runtime support to incorporate SAW in trustworthy ubicomp application software. The development support is to provide SAW requirement specification and automated code generation to achieve SAW in trustworthy ubicomp application software, and the runtime support is for context acquisition, situation analysis and situation‐aware communication. To realize our approach, the improved Reconfigurable Context‐Sensitive Middleware (RCSM) is developed to provide the above development and runtime support. Copyright © 2006 John Wiley & Sons, Ltd.

[1]  Benedict G. E. Wiedemann Protection? , 1998, Science.

[2]  Sandeep K. S. Gupta,et al.  Smart classroom: Enhancing collaborative learning using pervasive computing technology , 2003 .

[3]  Stephen S. Yau,et al.  An adaptive, lightweight and energy-efficient context discovery protocol for ubiquitous computing environments , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[4]  Gregory D. Abowd,et al.  A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications , 2001, Hum. Comput. Interact..

[5]  Stephen S. Yau,et al.  An Energy-Efficient Object Discovery Protocol for Context-Sensitive Middleware for Ubiquitous Computing , 2003, IEEE Trans. Parallel Distributed Syst..

[6]  Stephen S. Yau,et al.  Situation-aware access control for service-oriented autonomous decentralized systems , 2005, Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005..

[7]  Paul Bowman,et al.  Hitting the distributed computing sweet spot with TSpaces , 2001, Comput. Networks.

[8]  Mustaque Ahamad,et al.  A context-aware security architecture for emerging applications , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[9]  C. V. Ramamoorthy,et al.  Knowledge and Data Engineering , 1989, IEEE Trans. Knowl. Data Eng..

[10]  David Yoon,et al.  A Smart Classroom For Enhancing Collaborative Learning Using Pervasive Computing Technology , 2003 .

[11]  Douglas C. Schmidt,et al.  Research Advances in Middleware for Distributed Systems: State of the Art , 2002 .

[12]  Alvin T. S. Chan,et al.  MobiPADS: A Reflective Middleware for Context-Aware Mobile Computing , 2003, IEEE Trans. Software Eng..

[13]  James W. Layland,et al.  Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment , 1989, JACM.

[14]  Stephen S. Yau,et al.  A context-sensitive middleware for dynamic integration of mobile devices with network infrastructures , 2004, J. Parallel Distributed Comput..

[15]  Philippe Debaty,et al.  Creating Web Representations for Places , 2000, HUC.

[16]  Stephen S. Yau,et al.  Development of situation-aware application software for ubiquitous computing environments , 2002, Proceedings 26th Annual International Computer Software and Applications.

[17]  Sang Hyuk Son,et al.  Feedback Control Real-Time Scheduling: Framework, Modeling, and Algorithms* , 2001, Real-Time Systems.

[18]  Steven A. Demurjian,et al.  Security Engineering for Roles and Resources in a Distributed Environment , 2002 .

[19]  Sandeep K. S. Gupta,et al.  Reconfigurable Context-Sensitive Middleware for Pervasive Computing , 2002, IEEE Pervasive Comput..

[20]  Stephen S. Yau,et al.  An Adaptive Middleware for Context-Sensitive Communications for Real-Time Applications in Ubiquitous Computing Environments , 2004, Real-Time Systems.

[21]  Roy H. Campbell,et al.  Building Applications for Ubiquitous Computing Environments , 2002, Pervasive.

[22]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[23]  Jan H. P. Eloff,et al.  A Context-Sensitive Access Control Model and Prototype Implementation , 2000, SEC.

[24]  Gerald C. Nelson,et al.  Context-aware and location systems , 1998 .

[25]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[26]  Elisa Bertino,et al.  A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.