Marcin Alan Tunia

  • Citations Per Year
Learn More
Last decades the contextual approach became an important methodology of analysing information processes in the dynamic environment. In this paper we propose a context management framework suitable for secure network services. The framework allows tracking the contextual information from its origin, through all stages of its processing up to application in(More)
Context-aware processing is a part of intensively developed ubiquitous computing and mobile systems. Surrounding awareness is used to introduce new functions and solutions. Some categories of the context data are taken for security purposes in the context-aware security implementations. This kind of data has to meet some conditions since it is used for(More)
There are several reports and white papers which attempt to precise 5G architectural requirements presenting them from different points of view, including techno-socio-economic impacts and technological constraints. Most of them deal with network slicing aspects as a central point, often strengthening slices with slice isolation. The goal of this paper is(More)
Cryptography and security systems are two elds of security research that strongly interact and complement each other. The series of International Conferences on Cryptography and Security Systems (CSS) is a forum for presentation of theoretical and applied research papers, case studies, implementation experiences, as well as work-in-progress results in these(More)
The present day Internet provides a wide range of services users can benefit from. Some of the services require gathering, processing and presenting data that come from many users in order to deliver additional information. The suitable example can be social networking service. The more valuable data it stores and processes, the more profitable it can(More)
  • 1