Abstract
The need of devices in crisis management to be configured dynamically by detecting device characteristics i.e. polices defined by the user or organization, contextual information relevant to a given scenario etc is of paramount importance. Where such information can either be already predefined or the user is allowed to define such information via automatically generated input User Interface (UI) associated to one or more extensible markup languages. Hence, the layout of the devices and behavior will be automatically configured based on policy settings and contextual information in a dynamic manner as such information changes. We present a method that allows dynamic configuration of devices that improves information systems flexibility via realizing dynamic configuration of components and enhancing management and functionality of such devices and security issues within the environment. Moreover, as this method will provide an instant configuration of devices at runtime, the components can provide and be used with uninterrupted running ability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Weiser, M.: The computer for the 21st century. ACM SIGMOBILE Mobile Computing and Communications Review 3(3), 3–11 (1999)
Judith, G., Franz, S.: Information System Flexibility and the Performance of Business Processes. Journal of the Association for Information Systems (JAIS), 1–43 (2005)
Lu, L., Zongyong, L., Ruibo, L.: Improving Information System Flexibility through Remote Dynamic Component Configuration. In: 2006 International Conference on Service Systems and Service Management 2006 (2006)
Lee, J.-J., Huang, C.-Y., Lee, L.-Y., Lei, C.-L.: Design and implementation of secure communication channels over UPnP networks. In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), pp. 307–312 (2007)
OSGi: The OSGi Service Platform - Dynamic services for networked devices (2008), www.osgi.org (cited 2005)
Lee, J.-J., et al.: Design and implementation of secure communication channels over UPnP networks, Institute of Electrical and Electronics Engineers Computer Society, Piscataway, NJ 08855-1331, United States, Seoul, South Korea (2007)
DLNA: DLNA Overview and Vision Whitepaper (2006), http://www.dlna.org/en/industry/about/dlna_white_paper_2006.pdf (cited 2008)
HAVi: The HAVi Specification (2004), http://www.havi.org/HAVi_1.1.pdf (cited 2006)
ePerSpace: Towards the era of personal services at home and everywhere (2005), http://www.ist-eperspace.org/ (cited 2005)
Merabti, M., et al.: Managing Distributed Networked Appliances in Home Networks. Proceedings of the IEEE 96(1), 166–185 (2008)
Mol, J.J.D., et al.: Free-riding, fairness, and firewalls in P2P file-sharing. IEEE, Piscataway (2008)
Li, J.: On peer-to-peer (P2P) content delivery. Peer-to-Peer Networking and Applications 1(1), 45–63 (2008)
Abdullahi, A., Qi, S., Madjid, M.: Situation Awareness in Systems of Systems Ad-hoc Environments. In: Proceedings 5th International Conference Global Security, Safety, and Sustainability, ICGS3 2009, London, UK, September 1-2, vol. 45, pp. 27–34. Springer, Heidelberg (2009)
Haifeng, Y., Michael, K., Gibbons, P.B., Flaxman, A.D.: SybilGuard: Defending Against Sybil Attacks via Social Networks. IEEE/ACM Transactions on Networking 16(3), 576–589 (2008)
Benjamin, A., Geoff, H.: Detecting Man-in-the-Middle Attacks by Precise Timing. In: Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, pp. 81–86 (2009)
Bo, Z., Abdullahi, A., Oliver, D., David, L.-J., Madjid, M., Qi, S., Adrian, W., Rachel, C., Glyn, J., Arnold, K.L.Y.: Data Flow Security Analysis for System-of-Systems in a Public Security Incident. In: The 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008), Liverpool, UK (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Arabo, A., Shi, Q., Merabti, M. (2010). Dynamic Device Configuration in Ubiquitous Environments. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds) Global Security, Safety, and Sustainability. ICGS3 2010. Communications in Computer and Information Science, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15717-2_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-15717-2_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15716-5
Online ISBN: 978-3-642-15717-2
eBook Packages: Computer ScienceComputer Science (R0)