TY - GEN
T1 - Security policy integration and conflict reconciliation for collaborations among organizations in ubiquitous computing environments
AU - Yau, Sik-Sang
AU - Chen, Zhaoji
PY - 2008
Y1 - 2008
N2 - The investigative capabilities and productivity of researchers and practitioners of various organizations can be greatly expanded with collaborations among these organizations in ubiquitous computing environments. However, in order to provide effective collaborations among organizations in ubiquitous computing environments, due to the heterogeneity and dynamic nature of the ubiquitous computing environments it is critical to generate an integrated security policy set to govern the interactions among collaborating organizations during the collaboration. Existing approaches in security policy integration and conflict analysis have focused on static policy analysis which cannot address the dynamic formation of collaborative groups in ubiquitous computing environments. In this paper, an approach is presented to security policy integration, including a similarity-based policy adaptation algorithm for changing collaborative groups and a negotiation-based policy generation protocol for the new resources generated by the collaboration as well as for conflict reconciliation. Our approach can be automated with user defined control variables, which can greatly improve the efficiency and make the system scalable with little human intervention.
AB - The investigative capabilities and productivity of researchers and practitioners of various organizations can be greatly expanded with collaborations among these organizations in ubiquitous computing environments. However, in order to provide effective collaborations among organizations in ubiquitous computing environments, due to the heterogeneity and dynamic nature of the ubiquitous computing environments it is critical to generate an integrated security policy set to govern the interactions among collaborating organizations during the collaboration. Existing approaches in security policy integration and conflict analysis have focused on static policy analysis which cannot address the dynamic formation of collaborative groups in ubiquitous computing environments. In this paper, an approach is presented to security policy integration, including a similarity-based policy adaptation algorithm for changing collaborative groups and a negotiation-based policy generation protocol for the new resources generated by the collaboration as well as for conflict reconciliation. Our approach can be automated with user defined control variables, which can greatly improve the efficiency and make the system scalable with little human intervention.
KW - Conflict reconciliation
KW - Negotiation-based policy reconciliation
KW - Ontology
KW - Organization collaboration
KW - Security policy integration
KW - Similarity-based policy adaptation
KW - Ubiquitous computing environments
UR - http://www.scopus.com/inward/record.url?scp=48249100842&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=48249100842&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-69293-5_3
DO - 10.1007/978-3-540-69293-5_3
M3 - Conference contribution
AN - SCOPUS:48249100842
SN - 3540692924
SN - 9783540692928
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 3
EP - 19
BT - Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings
T2 - 5th International Conference on Ubiquitous Intelligence and Computing, UIC 2008
Y2 - 23 June 2008 through 25 June 2008
ER -