Filters








31,480 Hits in 3.5 sec

Access-controlled resource discovery for pervasive networks

Sanjay Raman, Dwaine Clarke, Matt Burnside, Srinivas Devadas, Ronald Rivest
2003 Proceedings of the 2003 ACM symposium on Applied computing - SAC '03  
This paper describes the design and implementation of an architecture for access-controlled resource discovery.  ...  This system achieves this goal by integrating access control with the Intentional Naming System (INS), a resource discovery and service location system.  ...  Resource discovery is vital to enabling operation in pervasive networks as the network state is unpredictable. The dynamism of pervasive networks also brings rise to problems of security.  ... 
doi:10.1145/952589.952600 fatcat:2zucusxyxbaone5naxfn54aci4

Access-controlled resource discovery for pervasive networks

Sanjay Raman, Dwaine Clarke, Matt Burnside, Srinivas Devadas, Ronald Rivest
2003 Proceedings of the 2003 ACM symposium on Applied computing - SAC '03  
This paper describes the design and implementation of an architecture for access-controlled resource discovery.  ...  This system achieves this goal by integrating access control with the Intentional Naming System (INS), a resource discovery and service location system.  ...  Resource discovery is vital to enabling operation in pervasive networks as the network state is unpredictable. The dynamism of pervasive networks also brings rise to problems of security.  ... 
doi:10.1145/952532.952600 dblp:conf/sac/RamanCBDR03 fatcat:jyvsozoo35huxidzpkn25w5bme

Assessing Software Risks by Implementing Cloud Readiness and Benchmarking in the Pervasive Environments

2019 International Journal of Engineering and Advanced Technology  
This state of art will create a case for developing new models for access control, identity, trust, risk management in ubiquitous or pervasive computing environments.  ...  This research has been provisioned with the comprehensive focus on pervasive devices user interaction, access control modeling, identity management, trust and service discovery modeling.  ...  Access Control The main objective of access control on system should be putting restrictions on the actions a legitimate user performs on a given resource [17] .Various models for access control include  ... 
doi:10.35940/ijeat.a1024.1091s19 fatcat:cpfhspnoafhc3lz6qxeg5ba6vq

Efficient Context-aware Service Discovery in Multi-Protocol Pervasive Environments

P. Raverdy, O. Riva, A. de La Chapelle, R. Chibout, V. Issarny
2006 7th International Conference on Mobile Data Management (MDM'06)  
To address these issues, we have developed the Multi-Protocol Service Discovery and Access (MSDA) middleware platform 2 , which provides context-aware service discovery and access in pervasive environments  ...  Service discovery is a critical functionality of emerging pervasive computing environments.  ...  Q-CAD [1] is a QoS and contextaware resource discovery framework for pervasive environments.  ... 
doi:10.1109/mdm.2006.78 dblp:conf/mdm/RaverdyRCCI06 fatcat:6rsmdavzjzbgrao5amdreeem34

A Peer-to-Peer Architecture for Remote Service Discovery

Stefan D. Bruda, Farzad Salehi, Yasir Malik, Bessam Abdulrazak
2012 Procedia Computer Science  
We propose a new service discovery architecture for enabling typical (local) service discovery mechanisms (without the ability of remote service discovery) to discover services remotely.  ...  Our architecture does not depend on any particular local discovery protocol and is realized in a fully distributed (namely, peer-to-peer) manner.  ...  Secondly, a new control point in the network multicasts a discovery message, searching for available devices and services (discovery-search).  ... 
doi:10.1016/j.procs.2012.06.133 fatcat:gh2rzvs7jjddjpyw46g2muei6y

Classification and Handling of Anonymity in Pervasive Middleware

G. Radhamani, K. Vanitha, D. Rajeswari
2011 International Journal of Computer Applications  
Therefore in this paper we define the presence of anonymity in pervasive environments using the said issues. We also analyze and compare few middleware applications for handling anonymity.  ...  Above aspects referred as anonymity in pervasive computing. Middleware is an intermediate software application that connects pervasive devices.  ...  [3] discussed a privacy-aware solution for service discovery in heterogeneous networks, based on the MUSDAC platform and privacy issues that arise during service discovery and mechanisms to control  ... 
doi:10.5120/2223-2833 fatcat:6la3inhxzjg7dir7ocui43as3a

A system architecture for pervasive computing

Robert Grimm, Tom Anderson, Brian Bershad, David Wetherall
2000 Proceedings of the 9th workshop on ACM SIGOPS European workshop beyond the PC: new challenges for the operating system - EW 9  
Pervasive computing, with its focus on users and their tasks rather than on computing devices and technology, provides an attractive vision for the future of computing.  ...  Our architecture is targeted at application developers and administrators, and it supports mobile computations, persistent storage, and resource discovery within a single, comprehensive framework.  ...  Acknowledgments We thank Mark Fiuczynski and Hank Levy for providing valuable feedback on earlier versions of this paper.  ... 
doi:10.1145/566752.566763 fatcat:jjkuzgu2gbdnzazcl222455zu4

A system architecture for pervasive computing

Robert Grimm, Tom Anderson, Brian Bershad, David Wetherall
2000 Proceedings of the 9th workshop on ACM SIGOPS European workshop beyond the PC: new challenges for the operating system - EW 9  
Pervasive computing, with its focus on users and their tasks rather than on computing devices and technology, provides an attractive vision for the future of computing.  ...  Our architecture is targeted at application developers and administrators, and it supports mobile computations, persistent storage, and resource discovery within a single, comprehensive framework.  ...  Acknowledgments We thank Mark Fiuczynski and Hank Levy for providing valuable feedback on earlier versions of this paper.  ... 
doi:10.1145/566726.566763 dblp:conf/sigopsE/GrimmABW00 fatcat:bgrtsscvf5f6joakeg2qzqwjwq

Vesta: A secure and autonomic system for pervasive healthcare

Yanmin Zhu, Morris Sloman, Emil Lupu, Sye Loong Keoh
2009 Proceedings of the 3d International ICST Conference on Pervasive Computing Technologies for Healthcare  
This paper describes a body sensor network comprising a personal controller, various biosensors and actuators for pervasive healthcare.  ...  Finegrained access control of the system is realized through authorization policies. Experimental evaluation shows that it is viable and practical for real-world pervasive healthcare.  ...  Fine-grained access control to resources at the target system must be performed for authenticated user. A.  ... 
doi:10.4108/icst.pervasivehealth2009.5939 dblp:conf/ph/ZhuSLK09 fatcat:fqoyfvzvnvenvgsr6ehte32zua

Semantic-Based Knowledge Dissemination and Extraction in Smart Environments

M. Ruta, F. Scioscia, E. Di Sciascio, D. Rotondi, S. Piccione
2013 2013 27th International Conference on Advanced Information Networking and Applications Workshops  
Logic-based standard and non-standard inference services can be exploited in matchmaking and negotiation for service/resource discovery and on-the-fly reasoning, as well as for large-scale analyses.  ...  way, without requiring a central control and coordination.  ...  The u-KB layer provides common primitives for resource discovery in both cases.  ... 
doi:10.1109/waina.2013.249 dblp:conf/aina/RutaSSRP13 fatcat:d43rbifwmvd2dpjvegte4dxs5e

Social computing networks

Naeem Esfahani, Sam Malek
2010 Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - ICSE '10  
Hence, the discovery mechanism needs to take into account accessibility, trust, and availability of the resources within one's turf network. For each resource, the search is performed in three steps.  ...  to those that comply with the CellPhone specification from the domain ontology; finally, the complying resources to which Agnes has access are selected (recall from Section 3.1 that access control defines  ... 
doi:10.1145/1810295.1810319 dblp:conf/icse/EsfahaniM10 fatcat:xqemk4vp6rfo7d5ygl34ulpgka

A Survey of Security Middleware for Pervasive and Ubiquitous Systems

Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah Al-Abdouli, Nader Mohamed
2009 2009 International Conference on Network-Based Information Systems  
Middleware is an essential component in this field and recently more emphasis has been put on security middleware as an enabling component for pervasive and ubiquitous applications.  ...  Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields.  ...  DMW is a network oriented middleware that resides in each peer device; it acts as a facilitator for value-added services with access control and copy control during content rendering and distribution.  ... 
doi:10.1109/nbis.2009.31 dblp:conf/nbis/Al-JaroodiAAM09 fatcat:5mpt4b24cjhynhop3dveyrw6ve

Standards, tools & best practices - The universal remote console: a universal access bus for pervasive computing

B. LaPlant, S. Trewin, G. Zimmermann, G. Vanderheiden
2004 IEEE pervasive computing  
A URC can use any form of networking to access Resources via a Resource-URC Network (RUN). The URC standard doesn't specify the mechanism by which a URC accesses Supplemental Resources.  ...  that combine to enable remote user interfaces and remote control of network-accessible Targets through a URC.  ... 
doi:10.1109/mprv.2004.1269134 fatcat:22exl2oso5euhewe25luihlz5q

Mobility Across Multiple Technologies -the Daidalos Approach

Piotr PACYNA, Janusz GOZDECKI, Krzysztof LOZIAK, Andrzej JAJSZCZYK
2006 Interdisciplinary Information Sciences  
It is being tested in different network environments of single-hop radio access networks (802.11, 802.16, TD-CDMA) and broadcast networks (DVB-T).  ...  It will also be tested soon in multi-hop ad-hoc (802.11e) and in moving networks (NEMO).  ...  The authors wish to thank the partners of the Daidalos Consortium, in particular partners of WP2 and WP3 for their collaborative work.  ... 
doi:10.4036/iis.2006.127 fatcat:aph3sh2iwzhrrouxblwklyhubu

Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments [chapter]

Anupam Joshi, Timothy Finin, Yelena Yesha
2002 Lecture Notes in Computer Science  
In particular, we describe our ongoing projects that have used DAML for service discovery, service composition, data management, and trust based security in pervasive computing environments.  ...  Increasing computational capabilities and decreasing costs of commonly used devices, and the concomitant development of short range, ad-hoc networking technologies, will help realize the pervasive computing  ...  Conclusions We have described the work of the eBiquity group at UMBC toward building a framework that enables discovery, composition and management of services and information in a pervasive computing  ... 
doi:10.1007/3-540-36189-8_20 fatcat:jjfoovh5dne2piqlquyycnpe3y
« Previous Showing results 1 — 15 out of 31,480 results