Towards self-protecting ubiquitous systems: monitoring trust-based interactions

Colin English, Sotirios Terzis, Paddy Nixon

Research output: Contribution to journalArticle

17 Citations (Scopus)

Abstract

The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches ineffective. As a result, to support secure collaborations entities must implement self-protective measures. Trust management is a solution well suited to this task as reasoning about future interactions is based on the outcome of past ones. This requires monitoring of interactions as they take place. Such monitoring also allows us to take corrective action when interactions are proceeding unsatisfactorily. In this vein, we first present a trust-based model of interaction based on event structures. We then describe our ongoing work in the development of a monitor architecture which enables self-protective actions to be carried out at critical points during principal interaction. Finally, we discuss some potential directions for future work.
LanguageEnglish
Number of pages8
JournalPersonal and Ubiquitous Computing
Volume10
Issue number1
DOIs
Publication statusPublished - 31 Aug 2005

Fingerprint

Monitoring
Ubiquitous computing
Interaction
System monitoring

Keywords

  • self-protection
  • trust
  • interaction monitoring
  • security
  • trust management

Cite this

@article{6daaea103da24b898cee445027a6edaf,
title = "Towards self-protecting ubiquitous systems: monitoring trust-based interactions",
abstract = "The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches ineffective. As a result, to support secure collaborations entities must implement self-protective measures. Trust management is a solution well suited to this task as reasoning about future interactions is based on the outcome of past ones. This requires monitoring of interactions as they take place. Such monitoring also allows us to take corrective action when interactions are proceeding unsatisfactorily. In this vein, we first present a trust-based model of interaction based on event structures. We then describe our ongoing work in the development of a monitor architecture which enables self-protective actions to be carried out at critical points during principal interaction. Finally, we discuss some potential directions for future work.",
keywords = "self-protection, trust, interaction monitoring, security, trust management",
author = "Colin English and Sotirios Terzis and Paddy Nixon",
year = "2005",
month = "8",
day = "31",
doi = "10.1007/s00779-005-0030-y",
language = "English",
volume = "10",
journal = "Personal and Ubiquitous Computing",
issn = "1617-4909",
number = "1",

}

Towards self-protecting ubiquitous systems : monitoring trust-based interactions. / English, Colin; Terzis, Sotirios; Nixon, Paddy.

In: Personal and Ubiquitous Computing, Vol. 10, No. 1, 31.08.2005.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Towards self-protecting ubiquitous systems

T2 - Personal and Ubiquitous Computing

AU - English, Colin

AU - Terzis, Sotirios

AU - Nixon, Paddy

PY - 2005/8/31

Y1 - 2005/8/31

N2 - The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches ineffective. As a result, to support secure collaborations entities must implement self-protective measures. Trust management is a solution well suited to this task as reasoning about future interactions is based on the outcome of past ones. This requires monitoring of interactions as they take place. Such monitoring also allows us to take corrective action when interactions are proceeding unsatisfactorily. In this vein, we first present a trust-based model of interaction based on event structures. We then describe our ongoing work in the development of a monitor architecture which enables self-protective actions to be carried out at critical points during principal interaction. Finally, we discuss some potential directions for future work.

AB - The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches ineffective. As a result, to support secure collaborations entities must implement self-protective measures. Trust management is a solution well suited to this task as reasoning about future interactions is based on the outcome of past ones. This requires monitoring of interactions as they take place. Such monitoring also allows us to take corrective action when interactions are proceeding unsatisfactorily. In this vein, we first present a trust-based model of interaction based on event structures. We then describe our ongoing work in the development of a monitor architecture which enables self-protective actions to be carried out at critical points during principal interaction. Finally, we discuss some potential directions for future work.

KW - self-protection

KW - trust

KW - interaction monitoring

KW - security

KW - trust management

UR - http://www.cis.strath.ac.uk/research/publications/papers/strath_cis_publication_217.pdf

U2 - 10.1007/s00779-005-0030-y

DO - 10.1007/s00779-005-0030-y

M3 - Article

VL - 10

JO - Personal and Ubiquitous Computing

JF - Personal and Ubiquitous Computing

SN - 1617-4909

IS - 1

ER -