Continuous Context-Aware Device Comfort Evaluation Method

被引:0
|
作者
Guo, Jingjing [1 ]
Jensen, Christian Damsgaard [2 ]
Ma, Jianfeng [1 ]
机构
[1] Xidian Univ, Sch Comp, Xian 710071, Peoples R China
[2] Tech Univ Denmark, Dept Appl Math & Comp Sci, DK-2800 Lyngby, Denmark
来源
TRUST MANAGEMENT IX | 2015年 / 454卷
关键词
Context-aware; Mobile device; Device comfort; SECURITY;
D O I
10.1007/978-3-319-18491-3_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices have become more powerful and are increasingly integrated in the everyday life of people; from playing games, taking pictures and interacting with social media to replacing credit cards in payment solutions. The security of a mobile device is therefore increasingly linked to its context, such as its location, surroundings (e.g. objects and people in the immediate environment) and so on, because some actions may only be appropriate in some situations; this is not captured by traditional security models. In this paper, we examine the notion of Device Comfort and propose a way to calculate the sensitivity of a specific action to the context. We present two different methods for a mobile device to dynamically evaluate its security status when an action is requested, either by the user or by another device. The first method uses the predefined ideal context as a standard to assess the comfort level of a device in the current context. The second method is based on the familiarity of the device with doing the particular action in the current context. These two methods suit different situations of the device owner's ability to deal with system security. The assessment result can activate responding action of the device to protect its resource.
引用
收藏
页码:203 / 211
页数:9
相关论文
共 50 条
  • [1] A Context-Aware Evaluation Method of Driving Behavior
    Zhai, Yikai
    Wo, Tianyu
    Lin, Xuelian
    Huang, Zhou
    Chen, Junyu
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2018, PT I, 2018, 10937 : 462 - 474
  • [2] Context-Aware Continuous Authentication and Dynamic Device Pairing for Enterprise IoT
    Yu, Na
    Ma, Jia
    Jin, Xudong
    Wang, Jian
    Chen, Ken
    [J]. INTERNET OF THINGS - ICIOT 2019, 2019, 11519 : 114 - 122
  • [3] Resilient Context-Aware Medical Device Security
    Sametinger, Johannes
    Steinwender, Clemens
    [J]. PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1775 - 1778
  • [4] A context-aware locomotion assistance device for the blind
    Jacquet, C
    Bellik, Y
    Bourda, Y
    [J]. COMPUTERS HELPING PEOPLE WITH SPECIAL NEEDS: PROCEEDINGS, 2004, 3118 : 438 - 445
  • [5] A context-aware locomotion assistance device for the blind
    Jacquet, C
    Bourda, Y
    Bellik, Y
    [J]. PEOPLE AND COMPUTERS XVIII - DESIGN FOR LIFE, 2005, : 315 - 328
  • [6] Context-Aware Fusion for Continuous Biometric Authentication
    Sivasankaran, Divya
    Sayed, Mona Ragab
    Sim, Terence
    Zick, Yair
    [J]. 2018 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2018, : 233 - 240
  • [7] A Context-Aware Smart Office for Improved Comfort and Energy Saving
    Miraoui, Moeiz
    [J]. INTELLIGENT ENVIRONMENTS 2018, 2018, 23 : 455 - 465
  • [8] Adaptable and Context-Aware Trustworthiness Evaluation
    Lenzini, Gabriele
    Toivonen, Santtu
    Uusitalo, Ilkka
    [J]. ERCIM NEWS, 2006, (67): : 46 - 47
  • [9] A method for generating context-aware services
    Maeda, Jun
    Takase, Masaaki
    Kakemizu, Mitsuaki
    [J]. APSITT 2005: 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, Proceedings, 2005, : 219 - 223
  • [10] A Device Configuration Management Tool for Context-Aware System
    Kuutti, Anna
    Dvoryanchikova, Aleksandra
    Lobov, Andrei
    Lastra, Jose Luis Martinez
    Vahtera, Tommi
    [J]. 2012 10TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2012, : 10 - 15