UCL Logo Networks Research Group Logo
  

UCL >> Department of Computer Science >> Networks Research Group >> Projects >> MARS
Main Overview People Publications

Publications

mars.bib

@INPROCEEDINGS{Ahmed:05,
  AUTHOR = {M. Ahmed and D. Quercia and S. Hailes},
  TITLE = {{A Statistical Matching
	 Approach to Detect Privacy Violation for Trust-Based Collaborations}},
  BOOKTITLE = {{First International Workshop on Trust, Security and
	 Privacy for Ubiquitous Computing. (Affiliated with WOWMOM 2005)}},
  YEAR = {2005},
  ADDRESS = {Sicily, Italy},
  MONTH = {June},
  PUBLISHER = {IEEE},
  ABSTRACT = {Distributed trust and
	 reputation management mechanisms are often proposed as a means of
	 providing assurance in dynamic and open environments by enabling
	 principals to building up knowledge of the entities with which they
	 interact. However, there is a tension between the preservation of
	 privacy (which would suggest a refusal to release information) and the
	 controlled release of information that is necessary both in order
	 to accomplish tasks and to provide a foundation for the assessment
	 of trustworthiness. However, if reputation-based systems are to be
	 used in assessing the risks of privacy violation, it is necessary
	 both to discover when sensitive information has been released, and
	 then to be able to evaluate the likelihood that each of the set of
	 principals that knew that information was involved in its release.},
  PDF = {http://www.cs.ucl.ac.uk/research/mars/papers/privacy.pdf}
}
@INPROCEEDINGS{Ahmed:Modelling:04,
  AUTHOR = {M. O. Ahmed and S. M. V. Hailes},
  TITLE = {{Modelling Interactions in Ubiquitous Environments}},
  BOOKTITLE = {{UK-UbiNet, 2nd UK-UbiNet Workshop}},
  YEAR = {2004},
  ADDRESS = {University of Cambridge, UK},
  MONTH = {May},
  ABSTRACT = {In all computer systems, interactions between parties
	 require the establishment of a level of trust that is determined to be
	 sufficient to permit the requested action to take place. Traditionally,
	 such trust has been policed centrally by having authorities that
	 determine whether or not an individual is trustworthy (cf Equifax
	 etc.). To make this work, several premises must hold: (1) there is
	 widespread trust in such authorities (2) the penalties that the central
	 authorities can impose by withdrawing their sanction are sufficiently
	 severe as to discourage bad behaviour (3) it is not possible for
	 individuals to easily change their identity to avoid such penalties..},
  KEYWORDS = {Trust, game theory, risk, ubiquitous},
  PDF = {http://www.cs.ucl.ac.uk/research/mars/papers/interact.pdf}
}
@INPROCEEDINGS{Ahmed:Dangers:04,
  AUTHOR = {Ahmed, M.O. and Hailes, S.M.V. and Seleznyov, A.},
  TITLE = {{The Dangers Of Invisible Computing: Learning To Live With Uncertainty}},
  BOOKTITLE = {{Ubiconf 2004}},
  YEAR = {2004},
  ADDRESS = {Gresham College, London, UK},
  MONTH = {April},
  ABSTRACT = {The comfortable certainties about the nature of trust on which most
	 conventional security systems have been founded have always been
	 at best doubtful. In pervasive computing environments they become
	 both delusional and dangerous. As a consequence, it is necessary
	 for both technically aware service providers and technically na?1ve
	 end users to abandon the false hope that the behaviour of secure
	 pervasive systems can ever be predictable or repeatable; they must
	 learn to accept the same degree of uncertainty in trust for their
	 digital identities as they implicitly accept in their everyday human
	 relationships. Computing technology is disappearing into the environment in
	 a realisation of Mark Weiser s vision for ubiquitous (pervasive)
	 computing. In the near future, the collision of the Internet with
	 the embedded systems will mean a massive increase in both scale and
	 heterogeneity of networks. Security is absolutely essential to making
	 this a reality, but conventional security measures have little hope
	 of working; the centralised control of security, relying on the a
	 priori definition of the role, authority and relationships between
	 principals is both undesirable and unsustainable in such environments. In
	 this paper, we explore the need for security in pervasive systems,
	 the difficulties in providing it, and ways in which sociological
	 models of trust management map into the digital world. We will present
	 ADAM a means of enabling the automation of trust establishment and
	 maintenance through distributed knowledge acquisition and management
	 over a self-organised collection of agents. These agents collect and
	 collate information based on experience and recommendations from
	 different sources and thereby enable trusting decisions to be taken.},
  PDF = {http://www.cs.ucl.ac.uk/research/mars/papers/uncertainty.pdf}
}
@INPROCEEDINGS{Harbird:04,
  AUTHOR = {R. Harbird and S. Hailes and C. Mascolo},
  TITLE = {{Adaptive Resource Discovery for Ubiquitous Computing}},
  BOOKTITLE = {{2nd Workshop for Middleware for Pervasive and Ad Hoc Computing}},
  YEAR = {2004},
  ADDRESS = {Toronto, Canada},
  MONTH = {October},
  PUBLISHER = {ACM Press},
  ABSTRACT = {The terms pervasive and ubiquitous computing are used to describe a smart space
	 populated by hundreds of intelligent devices that are embedded in their
	 surroundings. Characteristically, ubiquitous computing devices must
	 blend into the background, unobtrusively collaborating to provide
	 valueadded services for users. Services are thus essential to the
	 success of this technology and, as a result, both service discovery and
	 service management will play a vital role in generating the revenue
	 stream that is a prerequisite for sustainable ubiquitous deployment.
	 On the one hand, the services provided should be evident by their
	 richness and variety and on the other, the complexity inherent in the
	 environment must be hidden from users. In this paper, we describe RUBI, a
	 resource discovery framework for ubiquitous computing. RUBI represents a
	 novel approach to resource discovery, because the primacy of the need
	 for adaptive autonomic behaviour is established within its design.},
  PDF = {http://www.cs.ucl.ac.uk/research/mars/papers/rubi.pdf}
}
@INPROCEEDINGS{Seleznyov:ADAM:04,
  AUTHOR = {A. Seleznyov and M.O. Ahmed and S. Hailes},
  TITLE = {{ADAM: An Agent-based Middleware Architecture for Distributed Access Control}},
  BOOKTITLE = {The Twenty-Second International Multi-Conference
	 on Applied Informatics: Artificial Intelligence and Applications},
  YEAR = {2004},
  EDITOR = {M.H. Hamza},
  PAGES = {200 - 205},
  ADDRESS = { Innsbruck, Austria},
  MONTH = {February },
  ORGANIZATION = {IASTED},
  PUBLISHER = {ACTA Press},
  ABSTRACT = {This paper outlines a conceptual architecture for an autonomic middleware
	 component designed to provide application-independent access control for
	 use in largescale highly-dynamic computing environments. In such
	 environments, most notably ambient/pervasive computing environments,
	 centralised access control policy determination is impossible or
	 inadvisable because of the complexity of trust relationships. In
	 the absence of centralisation, network resources are forced to make
	 trusting decisions locally, in the light of information that they
	 themselves can gather. Thus the architecture that is described in
	 this paper is founded around an automatic knowledge acquisition and
	 processing mechanism, acting as the foundations of a semi-autonomous
	 multi-agent system (MAS). The agents dynamically organise themselves
	 into cooperating distributed communities that mediate between users
	 and devices (collectively known as trustees) and network resources
	 (principals). Once activated by their owners, agents maintain user
	 credentials, negotiate amongst themselves to establish the credibility of
	 prospective trustees identities and cooperate to gather evidence about
	 the likelihood of trustees adhering to the policies of principals.},
  KEYWORDS = {Key Words Trust, authorisation, access control, ambient, autonomic},
  PDF = {http://www.cs.ucl.ac.uk/research/mars/papers/adam.pdf}
}
@INBOOK{Seleznyov:05,
  CHAPTER = {{Co-operation in the Digital Age - Engendering Trust in Electronic Environments}},
  TITLE = {{Intelligent Spaces - an Application of Pervasive ICT}},
  PUBLISHER = {Kluwer},
  YEAR = {2005},
  AUTHOR = {Seleznyov, A. and Ahmed, M.O. and Hailes, S.}
}
@ARTICLE{Seleznyov:04a,
  AUTHOR = {A. Seleznyov and M.O. Ahmed and S. Hailes},
  TITLE = {{Co-operation in the digital age - Engendering trust in electronic environments}},
  JOURNAL = {{BT Technology Journal}},
  YEAR = {2004},
  VOLUME = {22},
  NUMBER = {3},
  ABSTRACT = {The pervasive environment implies a massive increase in the scale of systems, the
	 heterogeneity of devices and diversity in services available, making the
	 complex task of centrally managing the environment unfeasible. The
	 scope and role of trusted third parties in facilitating trust is also
	 reduced because of the high number of bilateral trust relationships,
	 which cannot be predefined and managed statically. Moreover, the
	 dynamic, mobile and asynchronous nature of many of the devices means
	 that it is difficult to predict their state or context of operation
	 from moment to moment. All this adds up to increased uncertainty and
	 a need for a revision of the methods and concepts used to express
	 and assess trust and provide assurance. This work addresses this
	 need by defining realistic models of digital trust that are capable
	 of dealing with the uncertainties inherent in the environment and
	 that are aware of the contexts of interactions in evaluating trust.},
  PDF = {http://www.cs.ucl.ac.uk/research/mars/papers/bttj.pdf}
}
@INPROCEEDINGS{Seleznyov:04b,
  AUTHOR = {A. Seleznyov and S. Hailes},
  TITLE = {{A Model for Dynamic Access Control in Ubiquitous Environments}},
  BOOKTITLE = {{The 4th International Network Conference}},
  YEAR = {2004},
  ADDRESS = {Plymouth, UK}
}
@INPROCEEDINGS{seleznyov:Conceptual04,
  AUTHOR = {Seleznyov, A. and Hailes, S.},
  TITLE = {{A Conceptual Access Control Model Based on Distributed Knowledge Management}},
  BOOKTITLE = {{The proceedings of 18th International
	 Conference on Advanced Information Networking and Applications}},
  YEAR = {2004},
  ADDRESS = {Fukuoka, Japan},
  MONTH = {March},
  ORGANIZATION = {AINA},
  PUBLISHER = {IEEE Computer Society},
  ABSTRACT = {The conceptual architecture of the access control system described here is based
	 on automatic distributed acquisition and processing of knowledge
	 about users and device s in computer networks. It uses autonomous
	 agents for distributed knowledge management. Agents grouped into
	 distributed communities act as mediators between users/devices and network
	 resources. Communicating with each other, they make decisions about
	 whether a certain user or device can be given access to a requested
	 resource. In other words, agents in our system perform user/device
	 authentication, authorisation, and maintenance of user credentials.},
  PDF = {http://www.cs.ucl.ac.uk/research/mars/papers/accesscontrol.pdf}
}
@INPROCEEDINGS{Seleznyov:Distributed04,
  AUTHOR = {A. Seleznyov and S. Hailes},
  TITLE = {{Distributed Knowledge Management for Autonomous Access Control in Computer Networks}},
  BOOKTITLE = {{The International Conference on Information Technology: Information Assurance and Security}},
  YEAR = {2004},
  ADDRESS = {Las Vegas, NV, USA},
  MONTH = {April},
  ORGANIZATION = {ITCC},
  PUBLISHER = {IEEE Computer Society},
  ABSTRACT = {This work discusses a conceptual model
	 for automatic acquisition and processing of knowledge about users
	 and devices in computer networks. It employs autonomous agents for
	 distributed knowledge management. Agents grouped into distributed
	 communities act as mediators between users, devices, and network
	 resources. Communicating between each other they make decisions on
	 whether a certain user or device can be given access to a requested
	 resource. In other words, agents in our system perform user/device
	 authentication, authorisation, and maintenance of user credentials.},
  KEYWORDS = {Trust, Access Control,
	 Knowledge Management, Autonomous Agents, Distributed Architectures},
  PDF = {http://www.cs.ucl.ac.uk/research/mars/papers/knowledgeman.pdf}
}

This file has been generated by bibtex2html 1.70