Engineering Policy-Based Ubiquitous Systems

The advent of miniaturized sensors that can be carried on the body or embedded in the environment, together with ubiquitous ‘smartphones’ with various sensors means that ubiquitous computing systems already pervade our lives. However, for them to ‘disappear’ in the background, they need to be adaptive, autonomous and self-managing. We present an architectural model based on policy-based self-managed cells for engineering ubiquitous computing systems, and discuss issues of security and fault management. We indicate the need for learning adaptive behaviour from users and the importance of formal methods within the engineering design process.

[1]  Frank Stajano,et al.  Security for Whom?: The Shifting Security Assumptions of Pervasive Computing , 2002, ISSS.

[2]  Emil C. Lupu,et al.  AMUSE: autonomic management of ubiquitous e‐Health systems , 2008, Concurr. Comput. Pract. Exp..

[3]  Emil C. Lupu,et al.  Verification of Policy-Based Self-Managed Cell Interactions Using Alloy , 2009, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks.

[4]  Dimitrios Hatzinakos,et al.  Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling , 2008, EURASIP J. Adv. Signal Process..

[5]  René Mayrhofer,et al.  Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.

[6]  Yanmin Zhu,et al.  A policy system to support adaptability and security on body sensors , 2008, 2008 5th International Summer School and Symposium on Medical Devices and Biosensors.

[7]  Oliver Ray,et al.  Learning Rules from User Behaviour , 2009, AIAI.

[8]  George Pavlou,et al.  Policy refinement for DiffServ quality of service management , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..

[9]  Emil C. Lupu,et al.  Realising management and composition of Self-Managed Cells in pervasive healthcare , 2009, 2009 3rd International Conference on Pervasive Computing Technologies for Healthcare.

[10]  Robin Milner,et al.  Ubiquitous Computing: Shall we Understand It? , 2006, Comput. J..

[11]  Alessandra Russo,et al.  A goal-based approach to policy refinement , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..

[12]  Emil C. Lupu,et al.  A Mission Management Framework for Unmanned Autonomous Vehicles , 2009, MOBILWARE.

[13]  Sebastian Nanz,et al.  The Role of Abduction in Declarative Authorization Policies , 2008, PADL.

[14]  Ian Taylor,et al.  Shared visiting in EQUATOR city , 2002, CVE '02.

[15]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[16]  C. Pollard,et al.  Center for the Study of Language and Information , 2022 .

[17]  Krysia Broda,et al.  DARE: a system for distributed abductive reasoning , 2008, Autonomous Agents and Multi-Agent Systems.

[18]  Robin Milner,et al.  Bigraphs and Their Algebra , 2008, LIX.

[19]  Emil C. Lupu,et al.  A policy-based management architecture for mobile collaborative teams , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[20]  Mary Ellen Zurko,et al.  Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.

[21]  Emil C. Lupu,et al.  Securing body sensor networks: Sensor association and key management , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[22]  Emil C. Lupu,et al.  PEACE : a policy-based establishment of ad-hoc communities , 2004, 20th Annual Computer Security Applications Conference.

[23]  Donald F. Towsley,et al.  Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing , 2007, MobiCom '07.

[24]  Luc De Raedt,et al.  Inductive Logic Programming: Theory and Methods , 1994, J. Log. Program..

[25]  Oliver Ray,et al.  Nonmonotonic abductive inductive learning , 2009, J. Appl. Log..

[26]  Murray Shanahan,et al.  The Event Calculus Explained , 1999, Artificial Intelligence Today.

[27]  Jack Minker,et al.  An Overview of Nonmonotonic Reasoning and Logic Programming , 1993, J. Log. Program..

[28]  Jorge Lobo,et al.  Expressive policy analysis with enhanced system dynamicity , 2009, ASIACCS '09.

[29]  Andrew Campbell,et al.  The Rise of People-Centric Sensing , 2008, IEEE Internet Computing.

[30]  Emil C. Lupu,et al.  Vesta: A secure and autonomic system for pervasive healthcare , 2009, 2009 3rd International Conference on Pervasive Computing Technologies for Healthcare.

[31]  C. Q. Lee,et al.  The Computer Journal , 1958, Nature.