16,536 Hits in 5.7 sec

What the heck is this application doing? – A security-by-contract architecture for pervasive services

N. Dragoni, F. Massacci, T. Walter, C. Schaefer
2009 Computers & security  
To address the challenges of this paradigm we propose the notion of security-by-contract (S×C ), as in programming-by-contract, based on the notion of a mobile contract that a pervasive download carries  ...  To address the challenges of this paradigm we propose the notion of security-by-contract (S×C ), as in programming-by-contract, based on the notion of a mobile contract that a pervasive download carries  ...  Acknowledgement The author would like to thank the anonymous reviewers for their fruitful comments.  ... 
doi:10.1016/j.cose.2009.06.005 fatcat:u6umd5qg2bf5jg3atvbv3spgai

Autonomic Re-configuration of Pervasive Supervision Services

Peter H. Deussen, Matthias Baumgarten, Maurice Mulvenna, Antonio Manzalini, Corrado Moiso
2009 2009 First International Conference on Emerging Network Intelligence  
This paper describes a supervision system for autonomic distributed systems (e.g. a cloud computing environment).  ...  It is designed as a supplementary service and is structured as an ensemble of components that implement an autonomic control loop, which does not require any a priori knowledge on the structure of the  ...  Automatic Configuration of Pervasion The configuration of a supervision pervasion is done in a number of steps: Contracting: As supervision is a supplementary service to be used by ACE ensembles that provide  ... 
doi:10.1109/emerging.2009.18 fatcat:wl6gug4fgrfellxwhdkxyyvzke

Pervasive Smart Contracts for Blockchains in IoT Systems

Amir Taherkordi, Peter Herrmann
2018 Proceedings of the 2018 International Conference on Blockchain Technology and Application - ICBTA 2018  
The unique characteristics of IoT systems, such as heterogeneity and pervasiveness, pose challenges in designing smart contracts for IoT systems.  ...  The flexibility, scalability and modularity of the microservice architecture model make it an efficient approach for developing IoT smart contracts.  ...  ] , a microservice architecture is proposed to develop scalable and secure smart surveillance systems.  ... 
doi:10.1145/3301403.3301405 fatcat:op4hmzeakfc7ngpymsi2r6sl2u

Framework Design of Pervasive Computing System for Inter Space Interactions between Private and Public Smart Spaces

Shin-Young Lim, Lawrence Chung, Sumi Helal, Hen-I Yang
2009 International Journal of Fuzzy Logic and Intelligent Systems  
The seamless inter space interaction issues are related to establishing user's service environment by allocating relevant resources in a new location where there are no prior settings for the user or where  ...  The framework architecture will provide seamless inter space interactions initiated by changes in users' location to acquire negotiations of resources for new and current residents regarding service provision  ...  of each layer in system architecture for a specific service.  ... 
doi:10.5391/ijfis.2009.9.3.198 fatcat:7qa2u5ddfzeafats3uj66w4eha

Privacy-Aware Service Integration

Pierre Parrend, Stephane Frenot, Sebastian Hohn
2007 IEEE International Conference on Pervasive Services  
Since guaranteeing privacy inside the system is of little help if any malicious entity can break into it, a security architecture for OSGi based Extensible Service Systems is also defined.  ...  Privacy mechanisms exist for monolithic systems. However, pervasive environments that gather user data to support advanced services provide little control over the data an individual releases.  ...  Conclusion and Perspectives We have presented a security architecture, formalization and classification of meta-data for hybrid service systems.  ... 
doi:10.1109/perser.2007.4283946 dblp:conf/icps/ParrendFH07 fatcat:rdgdbigtwfhytftxav2rprqgia

A Contract-based Approach for Secure Service Discovery Systems

A. Nait-Sidi-Moh, M. Bakhouya, M. Wack
2007 IEEE International Conference on Pervasive Services  
In this paper, a contract-based approach for monitoring and controlling accesses to services in ubiquitous environments is presented.  ...  In this approach, client agents and server agents are bounded by contracts: the server agent expects that the client agent will not attempt to access other services than those it required, and the client  ...  In section 2, related work of secure service discovery systems is presented. Section 3 presents a contract-based model for service discovery systems.  ... 
doi:10.1109/perser.2007.4283953 dblp:conf/icps/Nait-Sidi-MohBW07 fatcat:c2y4cqfzynflnmb7uc4bgldeaq

Ubiquitous Health Care Monitoring Services (UHCMS): Review of Opportunities and Challenges

Norah I. Alsaeed, Nouf S. Aldahwan
2020 International Journal of Computer Applications  
Keywords Ubiquitous computing, Ubiquitous health care, health care monitoring systems, IoT-based health care services.  ...  for the growing pressure on health care institutions.  ...  The remote server provides web-services for the synchronization of data between mobile app and smart watch. In addition, the retrieval of the context data is performed by a Reasoner module.  ... 
doi:10.5120/ijca2020920631 fatcat:3iiqe4667baynbzflrkghb2kxa

Autonomic pervasive applications driven by abstract specifications

Ozan Günalp, Levent Gürgen, Vincent Lestideau, Philippe Lalanda
2012 Proceedings of the 2012 international workshop on Self-aware internet of things - Self-IoT '12  
Existing development approaches do not provide explicit support for managing dynamism. In this paper we describe Rondo, a tool suite for designing pervasive applications.  ...  Pervasive application architectures present stringent requirements that make their development especially hard.  ...  ACKNOWLEDGEMENTS This research work was supported by the European FP7 project BUTLER, under contract no. 287901.  ... 
doi:10.1145/2378023.2378028 fatcat:j7p7so2d7vh3xdqbrcru3ixucy

Trust-based security in pervasive computing environments

L. Kagal, T. Finin, A. Joshi
2001 Computer  
Acknowledgments This research was supported in part by the IBM EECOMS program and by the DARPA DAML program under contract F30602-97-1-0215, NSF CCR0070802, 1159875433.  ...  TRUST ARCHITECTURE FOR PERVASIVE SYSTEMS We have designed a policy-based framework that extends SPKI and role-based access control.  ...  This architecture is generally applicable to distributed systems but geared toward pervasive computing environments.  ... 
doi:10.1109/2.970591 fatcat:mbjvstfakrh4redptfa43o6rhy

Pervasiveness in a competitive multi-operator environment:the daidalos project

Rui Aguiar, Amardeo Sarma, Dennis Bijwaard, Loris Marchetti, Piotr Pacyna, Riccardo Pascotto
2007 IEEE Communications Magazine  
The fundamental concepts rely on federation of operators who create a pervasive environment for service provisioning, on integrated mobility, security, virtual identity for users, and resource management  ...  The project validates concepts by means of specification, implementation, and integration in a large research testbed.  ...  Detailed models are also avail-Virtual identities for a user in Daidalos. Figure 3 . 3 Pervasive vision reflected in the architecture.  ... 
doi:10.1109/mcom.2007.4342815 fatcat:v7kbqhjhr5gepipqmymsvi2opy

Pervasive Smart Spaces and Environments: A Service-Oriented Middleware Architecture for Wireless Ad Hoc and Sensor Networks

Miguel S. Familiar, José F. Martínez, Lourdes López
2012 International Journal of Distributed Sensor Networks  
This lightweight middleware architecture implements an agent-based virtual sensor service approach which is a compact semantic knowledge management scheme based on a dynamic composition model.  ...  However, in order for this kind of new generation infrastructures to have a large-scale dissemination, there are still some open issues to tackle.  ...  Additionally, authors would like to thank the anonymous reviewers for their valuable comments and suggestions, which have helped improve the present work.  ... 
doi:10.1155/2012/725190 fatcat:5kkwshbmx5bjbksnlyacbufng4

Extending Pervasive Devices with the Semantic Grid: A Service Infrastructure Approach

Tao Guan, Ed Zaluska, David De Roure
2006 The Sixth IEEE International Conference on Computer and Information Technology (CIT'06)  
This paper presents a service approach that extends pervasive devices with semantic Grid services by using a device-proxy-Grid system infrastructure.  ...  Grid computing provides a vision of accessing computational resources automatically on demand to deliver the services required with the appropriate quality.  ...  Its server component, which is used by service providers, enables secure authorised access to their resources, while its client component, used by a client, enables access to a Service Provider's resources  ... 
doi:10.1109/cit.2006.91 dblp:conf/IEEEcit/GuanZR06 fatcat:zj3tlmp36jcgbetapvq7i3q65y

Architecting Adaptable Security Infrastructures for Pervasive Networks through Components [chapter]

Marc Lacoste
2009 Communications in Computer and Information Science  
This is possible with component-based security architecture. We illustrate the benefits of this approach by presenting AMISEC, an integrated authentication and authorization middleware.  ...  Security management in pervasive networks should be fundamentally flexible.  ...  Sections 2 and 3 first review related work, and give some key requirements for a security architecture for pervasive networks.  ... 
doi:10.1007/978-3-642-10844-0_34 fatcat:2g3trfavdffyhbmh4iiuw7yoh4

A Survey on Service Composition Middleware in Pervasive Environments [article]

Noha Ibrahim, Frederic Le Mouel
2009 arXiv   pre-print
Then, a classification of these service composition middleware according to pervasive requirements - interoperability, discoverability, adaptability, context awareness, QoS management, security, spontaneous  ...  The development of pervasive computing has put the light on a challenging problem: how to dynamically compose services in heterogeneous and highly changing environments?  ...  Several other studies [14] [15] address security features for service composition using contracts [15] , verification formal methods [14] , or a security model for enforcing access control in extensible  ... 
arXiv:0909.2183v1 fatcat:crgeu324ynfmjdsydxn2ke6kdu

Securing e-business applications using smart cards

E.-M. Hamann, H. Henn, T. Schack, F. Seliger
2001 IBM Systems Journal  
(as, for example, specified by the Open Services Gateway Initiative OSGi~'), or user installed.  ...  A smart card used as a mobile personal cryptographic token is optimally suited for this pur- pose. To secure an individual transaction, a password by itself is not sufficient.  ... 
doi:10.1147/sj.403.0635 fatcat:ncrub5ju7rgxziittpdwxvhtae
« Previous Showing results 1 — 15 out of 16,536 results