F. Fransen, Sven Lachmund, J. Olk, Laurent Bussard
{"title":"在上下文信息中获得信任的基础结构","authors":"F. Fransen, Sven Lachmund, J. Olk, Laurent Bussard","doi":"10.1109/SECCOMW.2006.359543","DOIUrl":null,"url":null,"abstract":"In order to use context information for security decisions it is desired to have confidence that context information really represents the actual context of an entity. Existing context-aware architectures that are able to acquire context information upon request by an application are not capable of gaining this confidence. We propose a new context-aware architecture that embeds a trust evaluation infrastructure to establish a trust relationship to the source of context information and to analyze and assess context information for its plausibility. The trust evaluation infrastructure is generic in the sense that it can be applied to various fields of application since the trust evaluation methods that are tailored to a specific field of application can be added and removed dynamically","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"An Infrastructure for Gaining Trust in Context Information\",\"authors\":\"F. Fransen, Sven Lachmund, J. Olk, Laurent Bussard\",\"doi\":\"10.1109/SECCOMW.2006.359543\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to use context information for security decisions it is desired to have confidence that context information really represents the actual context of an entity. Existing context-aware architectures that are able to acquire context information upon request by an application are not capable of gaining this confidence. We propose a new context-aware architecture that embeds a trust evaluation infrastructure to establish a trust relationship to the source of context information and to analyze and assess context information for its plausibility. The trust evaluation infrastructure is generic in the sense that it can be applied to various fields of application since the trust evaluation methods that are tailored to a specific field of application can be added and removed dynamically\",\"PeriodicalId\":156828,\"journal\":{\"name\":\"2006 Securecomm and Workshops\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 Securecomm and Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECCOMW.2006.359543\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 Securecomm and Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECCOMW.2006.359543","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Infrastructure for Gaining Trust in Context Information
In order to use context information for security decisions it is desired to have confidence that context information really represents the actual context of an entity. Existing context-aware architectures that are able to acquire context information upon request by an application are not capable of gaining this confidence. We propose a new context-aware architecture that embeds a trust evaluation infrastructure to establish a trust relationship to the source of context information and to analyze and assess context information for its plausibility. The trust evaluation infrastructure is generic in the sense that it can be applied to various fields of application since the trust evaluation methods that are tailored to a specific field of application can be added and removed dynamically