Security models for contextual based global processing an architecture and overview

Gregory Vert, S. S. Iyengar, Vir Phoha

Research output: Chapter in Book/Entry/PoemConference contribution

1 Scopus citations

Abstract

In this paper, we introduce a new paradigm for global computation, one in which the context of collected information drives the type of processing and dissemination the information receives as it is dispersed around the world. The creation of this model has necessitated the development of new types of methods for securing contextual information because the internet itself inherently has not have security mechanisms. Security is typically localized at the nodes on the internet that process information. There are multiple models and methods that are under development to provide security for contexts. This paper presents the basics of a model that allows context consumers to determine the level of security contextual information should have. Security levels have a direct correlation with confidence in the integrity of contextual data and thus application of its processing.

Original languageEnglish (US)
Title of host publicationCSIIRW09
Subtitle of host publicationFifth Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies
DOIs
StatePublished - 2009
Externally publishedYes
EventCSIIRW 2009: 5th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies - Oak Ridge, TN, United States
Duration: Apr 13 2009Apr 15 2009

Publication series

NameACM International Conference Proceeding Series

Other

OtherCSIIRW 2009: 5th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies
Country/TerritoryUnited States
CityOak Ridge, TN
Period4/13/094/15/09

Keywords

  • Contextual processing security
  • Global contextual processing
  • Security brane

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Security models for contextual based global processing an architecture and overview'. Together they form a unique fingerprint.

Cite this