Information SeeSaw: Availability vs. security management in the UbiComp world

被引:0
|
作者
Dragovic, B [1 ]
Policroniades, C [1 ]
机构
[1] Univ Cambridge, Syst Res Grp, Comp Lab, Cambridge, England
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ubiquitous computing vision brings about a number of information security and privacy challenges, some of which we already face in the mobile computing arena. This work focuses on a context-specific class of information leakage threats not involving a malicious custodian. Information exposure threats arise as a side effect of a paxticular choice of data management procedures employed during legitimate information use or possession in a specific context. They affect, in different forms, information throughout its lifetime in a ubiquitous computing environment. To maximize information availability, and thus its value to user, under unpredictably varying threat models, we depart form static and inflexible approaches to secure data management to provide for continuous and adaptive information exposure protection. We outline a means of structured reasoning about information exposure and introduce a metric for its quantification. An approach to threat mitigating information management operations discrimination based on information utility change is also presented. To unify the introduced concepts into a coherent big picture we form a Levels of Exposure model. On the implementation side, we overview a type aware, sub-file granularity data repository system that meets the requirements implied in the paper.
引用
收藏
页码:200 / 216
页数:17
相关论文
共 50 条
  • [1] Today's world: Research vs. security
    Wilkie, D
    [J]. SCIENTIST, 2002, 16 (19): : 32 - 33
  • [2] Data survivability vs. security in information systems
    Levitin, Gregory
    Hausken, Kjell
    Taboada, Heidi A.
    Coit, David W.
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2012, 100 : 19 - 27
  • [3] Traditional vs. information management theory
    Alfino, M
    [J]. JOURNAL OF INFORMATION ETHICS, 1998, 7 (01) : 5 - 9
  • [4] NAMEPLATE VS. AVAILABILITY
    Willis, Frederick
    [J]. MECHANICAL ENGINEERING, 2016, 138 (01) : 8 - 8
  • [5] Central Bank Independence and Inflation Under Asymmetric Information: Delegation vs. Seesaw Effects
    Elgin, Ceyhun
    Oztunali, Oguz
    [J]. JOURNAL OF CENTRAL BANKING THEORY AND PRACTICE, 2024, 13 (02) : 245 - 270
  • [6] (B–L) symmetry vs. neutrino seesaw
    Adam Latosiński
    Krzysztof A. Meissner
    Hermann Nicolai
    [J]. The European Physical Journal C, 2013, 73
  • [7] Information Security Governance - Compliance management vs operational management
    von Solms, SH
    [J]. COMPUTERS & SECURITY, 2005, 24 (06) : 443 - 447
  • [8] Information Security Risk Management in a World of Services
    Lalanne, Vincent
    Munier, Manuel
    Gabillon, Alban
    [J]. 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 586 - 593
  • [9] Information availability vs. solution space size in a knowledge acquisition problem
    Kline, DM
    Mehrez, A
    Steinberg, GE
    [J]. COMPUTERS & OPERATIONS RESEARCH, 1999, 26 (03) : 281 - 292
  • [10] Vs. World
    White, Ross
    [J]. NEW ENGLAND REVIEW-MIDDLEBURY SERIES, 2010, 31 (02): : 173 - 173