Skip to main content

Security in Depth through Smart Space Cascades

  • Conference paper
Information Security and Privacy (ACISP 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6812))

Included in the following conference series:

  • 895 Accesses

Abstract

Security in depth relies on controlled access across a layering of protective barriers. We introduce smart space cascades, a framework in which access control is applied to a hierarchy of smart spaces, as a way of achieving security in depth in the context of highly automated work environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: A context-aware security scheme for smart spaces. In: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, pp. 489–496. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  2. Al-Qutayri, M., Barada, H., Al-Mehairi, S., Nuaimi, J.: A framework for an end-to-end secure wireless smart home system. In: Proceedings of Annual IEEE International Systems Conference, pp. 1–7. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  3. Altunay, M., Brown, D.E., Byrd, G.T., Dean, R.A.: Collaboration policies: Access control management in decentralized heterogeneous workflows. Journal of Software 1(1), 11–22 (2006)

    Article  Google Scholar 

  4. Anderson, D., Keleher, P., Smith, P.: Towards and assessment tool for strategic management of asset criticality. Australian Journal of Mechanical Engineering 5(2), 115–126 (2008)

    Google Scholar 

  5. Australian Government: Protective security policy framework (2011)

    Google Scholar 

  6. Balasubramanian, M., Bhatnagar, A., Chaturvedi, N., Chowdhury, A.D., Ganesh, A.: A framework for decentralized access control. In: Proceedings of the 2nd ACM symposium on Information, Computer and Communications Security (ASIACCS 2007), pp. 93–104. ACM, New York (2007)

    Google Scholar 

  7. Billard, A., Long, B.: Dynamic security architectures: Architecture and case studies. DSTO Technical Report (in review), Defence Science and Technology Organisation (July 2009)

    Google Scholar 

  8. Brodt, A., Sathish, S.: Together we are strong—towards ad-hoc smart spaces. In: Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom 2009), pp. 1–4. IEEE Computer, Los Alamitos (2009)

    Google Scholar 

  9. Chandershekarapuram, A., Vogiatzis, D., Vassilaras, S., Yovanof, G.S.: Architecture framework for device single sign on in personal area networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4278, pp. 1367–1379. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Corradi, A., Montanari, R., Tibaldi, D., Toninelli, A.: A context-centric security middleware for service provisioning in pervasive computing. In: Proceedings of the 2005 Symposium on Applications and the Internet, pp. 421–429. IEEE Computer Society, Los Alamitos (2005)

    Chapter  Google Scholar 

  11. Das, S.K., Cook, D.J.: Designing and modelling smart environments. In: Proceedings of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), pp. 490–494. IEEE Computer Society, Los Alamitos (2006)

    Chapter  Google Scholar 

  12. Dimakis, N., Soldatos, J.K., Polymenakos, L., Fleury, P., Cuřín, J., Kleindienst, J.: Integrated development of context-aware applications in smart spaces. Pervasive Computing 7(4), 71–79 (2008)

    Article  Google Scholar 

  13. Helal, S., Mann, W., El-Zabadani, H., King, J., Kaddoura, Y., Jansen, E.: The Gator Tech Smart House: A programmable pervasive space. Computer 38(3), 50–60 (2005)

    Article  Google Scholar 

  14. Hitchins, D.K.: Secure systems—defence in depth. In: Proceedings of the European Convention on Security and Detection, pp. 34–39. IEEE Computer Society, Los Alamitos (1995)

    Chapter  Google Scholar 

  15. Dowell III, A.M.: Layer of protection analysis for determining safety integrity level. ISA Transactions 37, 155–165 (1998)

    Article  Google Scholar 

  16. International Standardization Organization: ISO/IEC 10181-3:1996(E): Information technology — open systems interconnection — security frameworks for open systems: Access control framework (1996)

    Google Scholar 

  17. Julien, C., Roman, G.C., Payton, J.: Context-sensitive access control for open mobile agent systems. In: Proceedings of the 3rd International Workshop on Software Engineering for Large-Scale Multi-Agent Systems, co-located with ICSE 2004, pp. 42–48 (2004)

    Google Scholar 

  18. Kizza, J.: Computer network security. Springer, Heidelberg (2005)

    MATH  Google Scholar 

  19. Marsá-Maestre, I., de la Hoz, E., Alarcos, B., Velasco, J.R.: A hierarchical, agent-based approach to security in smart offices. In: Proceedings of the International Conference on Ubiquitous Computing: Applications, Technology and Social Issues, ICUC 2006 (2006)

    Google Scholar 

  20. McCarthy, J., Thredgold, J.: Modelling smart security for classified rooms with DOVE. In: Proceedings of the Conference on Application and Theory of Petri Nets, pp. 135–144. Australian Computer Society (2002)

    Google Scholar 

  21. Moloney, M., Weber, S.: A context-aware trust-based security system for ad hoc networks. In: Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 153–160. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

  22. Nishiki, K., Tanaka, E.: Authentication and access control agent framework for context-aware services. In: Proceedings of the 2005 Symposium on Applications and the Internet Workshops, pp. 200–203. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

  23. Phillips, M.: Livespaces technical overview. DSTO Technical Report (draft), Defence Science and Technology Organisation (2008)

    Google Scholar 

  24. Price, S.M.: A defense-in-depth security architecture strategy inspired by antiquity. Information Systems Security Association 8(3), 10–16 (2010)

    Google Scholar 

  25. Sampemane, G., Naldurg, P., Campbell, R.H.: Access control for active spaces. In: Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), pp. 343–352. IEEE Computer Society, Los Alamitos (2002)

    Chapter  Google Scholar 

  26. Smith, C.L.: Understanding concepts in the defence in depth strategy. In: Proceedings of the 37th Annual 2003 International Carnahan Conference on Security Technology, pp. 8–16. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  27. Spivey, J.M.: The Z Notation: A Reference Manual. Prentice Hall International Series In Computer Science. Prentice Hall, London (1992)

    MATH  Google Scholar 

  28. Stanford, V., Garofolo, J., Galibert, O., Michel, M., Laprun, C.: The NIST smart space and meeting room projects: Signals, acquisition, annotation, and metrics. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2003), vol. 4, pp. 736–739. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  29. Suo, Y., Shi, Y.: Towards initiative smart space model. In: Proceedings of the Third International Conference on Pervasive Computing and Applications, pp. 747–752. IEEE Computer Society, Los Alamitos (2008)

    Google Scholar 

  30. Zhou, W., Meinel, C., Raja, V.H.: A framework for supporting distributed access control policies. In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), pp. 442–447. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Long, B.W. (2011). Security in Depth through Smart Space Cascades. In: Parampalli, U., Hawkes, P. (eds) Information Security and Privacy. ACISP 2011. Lecture Notes in Computer Science, vol 6812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22497-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22497-3_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22496-6

  • Online ISBN: 978-3-642-22497-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics