The increasing diffusion of wireless portable devices and the emergence of mobile ad-hoc networks promote anytime and anywhere opportunistic resource sharing. However, the fear of exposure to risky interactions is currently limiting the widespread uptake of ad-hoc collaborations. This chapter introduces to the challenge of identifying and validating novel security models/systems for securing ad-hoc collaborations, by taking into account the high unpredictability, heterogeneity, and dynamicity of envisioned wireless environments. We claim that the concept of trust management should become a primary engineering design principle, to associate with the subsequent trust refinement into effective authorization policies, thus calling for original and innovative access control models. The chapter overviews the state-of-the-art of solutions for trust management and access control in wireless environments, by pointing out both the need for their tight integration and the related emerging design guidelines, i.e., exploitation of context awareness and adoption of semantic technologies.
P. Bellavista, R. Montanari, D. Tibaldi, A. Toninelli (2008). Trust Management and Semantic Context-driven Ac-cess Control for Secure Ad-Hoc Collaborations. HERSHEY : IGI Global.
Trust Management and Semantic Context-driven Ac-cess Control for Secure Ad-Hoc Collaborations
BELLAVISTA, PAOLO;MONTANARI, REBECCA;TIBALDI, DANIELA;TONINELLI, ALESSANDRA
2008
Abstract
The increasing diffusion of wireless portable devices and the emergence of mobile ad-hoc networks promote anytime and anywhere opportunistic resource sharing. However, the fear of exposure to risky interactions is currently limiting the widespread uptake of ad-hoc collaborations. This chapter introduces to the challenge of identifying and validating novel security models/systems for securing ad-hoc collaborations, by taking into account the high unpredictability, heterogeneity, and dynamicity of envisioned wireless environments. We claim that the concept of trust management should become a primary engineering design principle, to associate with the subsequent trust refinement into effective authorization policies, thus calling for original and innovative access control models. The chapter overviews the state-of-the-art of solutions for trust management and access control in wireless environments, by pointing out both the need for their tight integration and the related emerging design guidelines, i.e., exploitation of context awareness and adoption of semantic technologies.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.