Abstract
Security in depth relies on controlled access across a layering of protective barriers. We introduce smart space cascades, a framework in which access control is applied to a hierarchy of smart spaces, as a way of achieving security in depth in the context of highly automated work environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: A context-aware security scheme for smart spaces. In: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, pp. 489–496. IEEE Computer Society, Los Alamitos (2003)
Al-Qutayri, M., Barada, H., Al-Mehairi, S., Nuaimi, J.: A framework for an end-to-end secure wireless smart home system. In: Proceedings of Annual IEEE International Systems Conference, pp. 1–7. IEEE Computer Society, Los Alamitos (2003)
Altunay, M., Brown, D.E., Byrd, G.T., Dean, R.A.: Collaboration policies: Access control management in decentralized heterogeneous workflows. Journal of Software 1(1), 11–22 (2006)
Anderson, D., Keleher, P., Smith, P.: Towards and assessment tool for strategic management of asset criticality. Australian Journal of Mechanical Engineering 5(2), 115–126 (2008)
Australian Government: Protective security policy framework (2011)
Balasubramanian, M., Bhatnagar, A., Chaturvedi, N., Chowdhury, A.D., Ganesh, A.: A framework for decentralized access control. In: Proceedings of the 2nd ACM symposium on Information, Computer and Communications Security (ASIACCS 2007), pp. 93–104. ACM, New York (2007)
Billard, A., Long, B.: Dynamic security architectures: Architecture and case studies. DSTO Technical Report (in review), Defence Science and Technology Organisation (July 2009)
Brodt, A., Sathish, S.: Together we are strong—towards ad-hoc smart spaces. In: Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom 2009), pp. 1–4. IEEE Computer, Los Alamitos (2009)
Chandershekarapuram, A., Vogiatzis, D., Vassilaras, S., Yovanof, G.S.: Architecture framework for device single sign on in personal area networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4278, pp. 1367–1379. Springer, Heidelberg (2006)
Corradi, A., Montanari, R., Tibaldi, D., Toninelli, A.: A context-centric security middleware for service provisioning in pervasive computing. In: Proceedings of the 2005 Symposium on Applications and the Internet, pp. 421–429. IEEE Computer Society, Los Alamitos (2005)
Das, S.K., Cook, D.J.: Designing and modelling smart environments. In: Proceedings of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), pp. 490–494. IEEE Computer Society, Los Alamitos (2006)
Dimakis, N., Soldatos, J.K., Polymenakos, L., Fleury, P., CuÅ™Ãn, J., Kleindienst, J.: Integrated development of context-aware applications in smart spaces. Pervasive Computing 7(4), 71–79 (2008)
Helal, S., Mann, W., El-Zabadani, H., King, J., Kaddoura, Y., Jansen, E.: The Gator Tech Smart House: A programmable pervasive space. Computer 38(3), 50–60 (2005)
Hitchins, D.K.: Secure systems—defence in depth. In: Proceedings of the European Convention on Security and Detection, pp. 34–39. IEEE Computer Society, Los Alamitos (1995)
Dowell III, A.M.: Layer of protection analysis for determining safety integrity level. ISA Transactions 37, 155–165 (1998)
International Standardization Organization: ISO/IEC 10181-3:1996(E): Information technology — open systems interconnection — security frameworks for open systems: Access control framework (1996)
Julien, C., Roman, G.C., Payton, J.: Context-sensitive access control for open mobile agent systems. In: Proceedings of the 3rd International Workshop on Software Engineering for Large-Scale Multi-Agent Systems, co-located with ICSE 2004, pp. 42–48 (2004)
Kizza, J.: Computer network security. Springer, Heidelberg (2005)
Marsá-Maestre, I., de la Hoz, E., Alarcos, B., Velasco, J.R.: A hierarchical, agent-based approach to security in smart offices. In: Proceedings of the International Conference on Ubiquitous Computing: Applications, Technology and Social Issues, ICUC 2006 (2006)
McCarthy, J., Thredgold, J.: Modelling smart security for classified rooms with DOVE. In: Proceedings of the Conference on Application and Theory of Petri Nets, pp. 135–144. Australian Computer Society (2002)
Moloney, M., Weber, S.: A context-aware trust-based security system for ad hoc networks. In: Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 153–160. IEEE Computer Society, Los Alamitos (2005)
Nishiki, K., Tanaka, E.: Authentication and access control agent framework for context-aware services. In: Proceedings of the 2005 Symposium on Applications and the Internet Workshops, pp. 200–203. IEEE Computer Society, Los Alamitos (2005)
Phillips, M.: Livespaces technical overview. DSTO Technical Report (draft), Defence Science and Technology Organisation (2008)
Price, S.M.: A defense-in-depth security architecture strategy inspired by antiquity. Information Systems Security Association 8(3), 10–16 (2010)
Sampemane, G., Naldurg, P., Campbell, R.H.: Access control for active spaces. In: Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), pp. 343–352. IEEE Computer Society, Los Alamitos (2002)
Smith, C.L.: Understanding concepts in the defence in depth strategy. In: Proceedings of the 37th Annual 2003 International Carnahan Conference on Security Technology, pp. 8–16. IEEE Computer Society, Los Alamitos (2003)
Spivey, J.M.: The Z Notation: A Reference Manual. Prentice Hall International Series In Computer Science. Prentice Hall, London (1992)
Stanford, V., Garofolo, J., Galibert, O., Michel, M., Laprun, C.: The NIST smart space and meeting room projects: Signals, acquisition, annotation, and metrics. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2003), vol. 4, pp. 736–739. IEEE Computer Society, Los Alamitos (2003)
Suo, Y., Shi, Y.: Towards initiative smart space model. In: Proceedings of the Third International Conference on Pervasive Computing and Applications, pp. 747–752. IEEE Computer Society, Los Alamitos (2008)
Zhou, W., Meinel, C., Raja, V.H.: A framework for supporting distributed access control policies. In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), pp. 442–447. IEEE Computer Society, Los Alamitos (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Long, B.W. (2011). Security in Depth through Smart Space Cascades. In: Parampalli, U., Hawkes, P. (eds) Information Security and Privacy. ACISP 2011. Lecture Notes in Computer Science, vol 6812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22497-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-22497-3_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22496-6
Online ISBN: 978-3-642-22497-3
eBook Packages: Computer ScienceComputer Science (R0)