2nd International ICST Workshop on the Value of Security through Collaboration

Research Article

An Infrastructure for Gaining Trust in Context Information

  • @INPROCEEDINGS{10.1109/SECCOMW.2006.359543,
        author={Frank  Fransen and Eddy  Olk and Sven  Lachmund and Laurent  Bussard},
        title={An Infrastructure for Gaining Trust in Context Information},
        proceedings={2nd International ICST Workshop on the Value of Security through Collaboration},
        publisher={IEEE},
        proceedings_a={SECOVAL},
        year={2007},
        month={5},
        keywords={context information; context-aware architecture; context information acquisition and delivery; trust evaluation; trust relationship; trust evaluation method; trust evaluation policy},
        doi={10.1109/SECCOMW.2006.359543}
    }
    
  • Frank Fransen
    Eddy Olk
    Sven Lachmund
    Laurent Bussard
    Year: 2007
    An Infrastructure for Gaining Trust in Context Information
    SECOVAL
    IEEE
    DOI: 10.1109/SECCOMW.2006.359543
Frank Fransen1, Eddy Olk2, Sven Lachmund3, Laurent Bussard4
  • 1: Security group TNO Information and Communication Technology, Groningen, The Netherlands
  • 2: Security group TNO Information and Communication Technology, Delft, The Netherlands
  • 3: Security Technology Lab DoCoMo Euro-Labs, Munich, Germany
  • 4: Security and Privacy Team European Microsoft Innovation Center, Aachen, Germany

Abstract

In order to use context information for security decisions it is desired to have confidence that context information really represents the actual context of an entity. Existing context-aware architectures that are able to acquire context information upon request by an application are not capable of gaining this confidence. We propose a new context-aware architecture that embeds a trust evaluation infrastructure to establish a trust relationship to the source of context information and to analyze and assess context information for its plausibility. The trust evaluation infrastructure is generic in the sense that it can be applied to various fields of application since the trust evaluation methods that are tailored to a specific field of application can be added and removed dynamically