Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016, Article ID 8743504, 16 pages
http://dx.doi.org/10.1155/2016/8743504
Research Article

On the Modelling of Context-Aware Security for Mobile Devices

1Institute of Computer Science, Maria Curie-Sklodowska University, Pl. M. Curie-Sklodowskiej 5, 20-031 Lublin, Poland
2Polish-Japanese Institute of Information Technology, Koszykowa 86, 02-008 Warsaw, Poland

Received 23 May 2016; Revised 15 August 2016; Accepted 31 August 2016

Academic Editor: Juan A. Gomez-Pulido

Copyright © 2016 Tomasz Zurek et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. Ksiezopolski, Z. Kotulski, and P. Szalachowski, “Adaptive approach to network security,” in Computer Networks, vol. 39 of Communications in Computer and Information Science, pp. 233–241, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  2. B. Ksiezopolski, Z. Kotulski, and P. Szalachowski, “On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems,” in Proceedings of the European Teletraffic Seminar, pp. 195–202, 2011.
  3. B. Ksiezopolski and Z. Kotulski, “Adaptable security mechanism for dynamic environments,” Computers & Security, vol. 26, no. 3, pp. 246–255, 2007. View at Publisher · View at Google Scholar · View at Scopus
  4. B. Ksiezopolski, D. Rusinek, and A. Wierzbicki, “On the modeling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML),” Annales UMCS Informatica AI XII, vol. 4, pp. 69–81, 2012. View at Google Scholar
  5. B. Ksiezopolski, D. Rusinek, and A. Wierzbicki, “On the efficiency modelling of cryptographic protocols by means of the Quality of Protection Modelling Language (QoP-ML),” in Information and Communication Technology, vol. 7804 of Lecture Notes in Computer Science, pp. 261–270, Springer, Berlin, Germany, 2013. View at Google Scholar
  6. C. Ntanos, C. Botsikas, G. Rovis, P. Kakavas, and D. Askounis, “A context awareness framework for cross-platform distributed applications,” The Journal of Systems and Software, vol. 88, no. 1, pp. 138–146, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Mowafi, D. Abou-Tair, T. Aqarbeh, M. Abilov, V. Dmitriyev, and J. M. Gomez, “A context-aware adaptive security framework for mobile applications,” in Proceedings of the 3rd International Conference on Context-Aware Systems and Applications (ICCASA '14), pp. 147–153, 2014.
  8. P. Makris, D. N. Skoutas, and C. Skianis, “A survey on context-aware mobile and wireless networking: on networking and computing environments' integration,” IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 362–386, 2012. View at Publisher · View at Google Scholar
  9. E. Hayashi, S. Das, S. Amini, J. Hong, and I. Oakley, “CASA: context-aware scalable authentication,” in Proceedings of the Symposium on Usable Privacy and Security (SOUPS '13), ACM, Menlo Park, Calif, USA, 2013.
  10. W. Li, A. Joshi, and T. Finin, “CAST: context-aware security and trust framework for mobile ad-hoc networks using policies,” Distributed and Parallel Databases, vol. 31, no. 2, pp. 353–376, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. A. Forkan, I. Khalil, and Z. Tari, “CoCaMAAL: a cloud-oriented context-aware middleware in ambient assisted living,” Future Generation Computer Systems, vol. 35, pp. 114–127, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Miettinen, S. Heuser, W. Kronz, A. Sadeghi, and N. Asokan, “ConXsense - Automated Context Classification for Context-Aware Access Control,” Computer and Communications Security (ASIACCS, pp. 293–304, 2014. View at Google Scholar
  13. Ö. Yılmaz and R. C. Erdur, “IConAwa—an intelligent context-aware system,” Expert Systems with Applications, vol. 39, no. 3, pp. 2907–2918, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. K. Stefanidis, E. Pitoura, and P. Vassiliadis, “Managing contextual preferences,” Information Systems, vol. 36, no. 8, pp. 1158–1180, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. S. Schefer-Wenzl and M. Strembeck, “Modeling context-aware RBAC models for business processes in ubiquitous computing environments,” in Proceedings of the 3rd FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC '12), pp. 126–131, Vancouver, Canada, June 2012. View at Publisher · View at Google Scholar
  16. R. Ali, F. Dalpiaz, and P. Giorgini, “Reasoning with contextual requirements: detecting inconsistency and conflicts,” Information and Software Technology, vol. 55, no. 1, pp. 35–57, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. M. Younas and S. Mostefaoui, “A new model for context-aware transactions in mobile services,” Personal and Ubiquitous Computing, vol. 15, no. 8, pp. 821–831, 2011. View at Publisher · View at Google Scholar
  18. C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context aware computing for the internet of things: a survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 414–454, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. G. J. Nalepa and S. Bobek, “Rule-based solution for context-aware reasoning on mobile devices,” Computer Science and Information Systems, vol. 11, no. 1, pp. 171–193, 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. L. Sliman, F. Biennier, and Y. Badr, “A security policy framework for context-aware and user preferences in e-services,” Journal of Systems Architecture, vol. 55, no. 4, pp. 275–288, 2009. View at Publisher · View at Google Scholar · View at Scopus
  21. A. Merlo, M. Migliardi, and L. Caviglione, “A survey on energy-aware security mechanisms,” Pervasive and Mobile Computing, vol. 24, pp. 77–90, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. H. Prakken and G. Vreeswijk, “Logics for defeasible argumentation,” in Handbook of Philosophical Logic, D. Gabbay, Ed., Kluwer Academic Publisher, 2000. View at Google Scholar
  23. ISO/IEC, “Information technology—security techniques—information security management systems—requirements,” ISO/IEC 27001:2005, 2005. View at Google Scholar
  24. B. Ksiezopolski, T. Zurek, and M. Mokkas, “Quality of protection evaluation of security mechanisms,” The Scientific World Journal, vol. 2014, Article ID 725279, 18 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  25. H. Prakken and G. Sartor, “A dialectical model of assessing conflicting arguments in legal reasoning,” Artificial Intelligence and Law, vol. 4, no. 3-4, pp. 331–368, 1996. View at Publisher · View at Google Scholar · View at Scopus
  26. T. Zurek, “Model of argument from social importance,” in Legal Knowledge and Information Systems: JURIX 2014, R. Hoekstra, Ed., vol. 271 of Frontiers in Artificial Intelligence and Applications, pp. 23–28, IOS Press, 2014. View at Google Scholar
  27. S. Modgil and H. Prakken, “The ASPIC+ framework for structured argumentation: a tutorial,” Argument and Computation, vol. 5, no. 1, pp. 31–62, 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. IETF, “The transport layer security (TLS) protocol v.1.2,” RFC 5246, IETF, 2008. View at Google Scholar
  29. M. Mokkas, “The source code of the context-aware application for mobile devices,” 2016, https://github.com/MikeMokkas/Contsec