Security models for contextual based global processing an architecture and overview

Gregory Vert, S. S. Iyengar, Vir Phoha

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we introduce a new paradigm for global computation, one in which the context of collected information drives the type of processing and dissemination the information receives as it is dispersed around the world. The creation of this model has necessitated the development of new types of methods for securing contextual information because the internet itself inherently has not have security mechanisms. Security is typically localized at the nodes on the internet that process information. There are multiple models and methods that are under development to provide security for contexts. This paper presents the basics of a model that allows context consumers to determine the level of security contextual information should have. Security levels have a direct correlation with confidence in the integrity of contextual data and thus application of its processing.

Original languageEnglish (US)
Title of host publicationCSIIRW09
Subtitle of host publicationFifth Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies
DOIs
StatePublished - Nov 9 2009
EventCSIIRW 2009: 5th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies - Oak Ridge, TN, United States
Duration: Apr 13 2009Apr 15 2009

Publication series

NameACM International Conference Proceeding Series

Other

OtherCSIIRW 2009: 5th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies
CountryUnited States
CityOak Ridge, TN
Period4/13/094/15/09

Keywords

  • Contextual processing security
  • Global contextual processing
  • Security brane

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Security models for contextual based global processing an architecture and overview'. Together they form a unique fingerprint.

  • Cite this

    Vert, G., Iyengar, S. S., & Phoha, V. (2009). Security models for contextual based global processing an architecture and overview. In CSIIRW09: Fifth Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies [53] (ACM International Conference Proceeding Series). https://doi.org/10.1145/1558607.1558668