Filters








31,480 Hits in 3.1 sec

Assessing Software Risks by Implementing Cloud Readiness and Benchmarking in the Pervasive Environments

2019 International Journal of Engineering and Advanced Technology  
This research has been provisioned with the comprehensive focus on pervasive devices user interaction, access control modeling, identity management, trust and service discovery modeling.  ...  This state of art will create a case for developing new models for access control, identity, trust, risk management in ubiquitous or pervasive computing environments.  ...  Access Control The main objective of access control on system should be putting restrictions on the actions a legitimate user performs on a given resource [17] .Various models for access control include  ... 
doi:10.35940/ijeat.a1024.1091s19 fatcat:cpfhspnoafhc3lz6qxeg5ba6vq

Efficient Context-aware Service Discovery in Multi-Protocol Pervasive Environments

P. Raverdy, O. Riva, A. de La Chapelle, R. Chibout, V. Issarny
2006 7th International Conference on Mobile Data Management (MDM'06)  
To address these issues, we have developed the Multi-Protocol Service Discovery and Access (MSDA) middleware platform 2 , which provides context-aware service discovery and access in pervasive environments  ...  In such environments, service discovery mechanisms need to (i) overcome the heterogeneity of hardware devices, software platforms, and networking infrastructures; and (ii) provide users with an accurate  ...  Managers in extending the service discovery and access to services present in other networks of the whole pervasive environment.  ... 
doi:10.1109/mdm.2006.78 dblp:conf/mdm/RaverdyRCCI06 fatcat:6rsmdavzjzbgrao5amdreeem34

A Peer-to-Peer Architecture for Remote Service Discovery

Stefan D. Bruda, Farzad Salehi, Yasir Malik, Bessam Abdulrazak
2012 Procedia Computer Science  
Our architecture does not depend on any particular local discovery protocol and is realized in a fully distributed (namely, peer-to-peer) manner.  ...  We propose a new service discovery architecture for enabling typical (local) service discovery mechanisms (without the ability of remote service discovery) to discover services remotely.  ...  Additionally, a control point may reside in a pervasive computing environment with heterogeneous protocols and networks; even if some otherwise available services in the local domain could not be accessed  ... 
doi:10.1016/j.procs.2012.06.133 fatcat:gh2rzvs7jjddjpyw46g2muei6y

Classification and Handling of Anonymity in Pervasive Middleware

G. Radhamani, K. Vanitha, D. Rajeswari
2011 International Journal of Computer Applications  
Above aspects referred as anonymity in pervasive computing. Middleware is an intermediate software application that connects pervasive devices.  ...  Pervasive devices are deployed in the world anywhere at any time that makes an adaption to the changes in the dynamic environment based on the user mobility.  ...  [3] discussed a privacy-aware solution for service discovery in heterogeneous networks, based on the MUSDAC platform and privacy issues that arise during service discovery and mechanisms to control  ... 
doi:10.5120/2223-2833 fatcat:6la3inhxzjg7dir7ocui43as3a

A system architecture for pervasive computing

Robert Grimm, Tom Anderson, Brian Bershad, David Wetherall
2000 Proceedings of the 9th workshop on ACM SIGOPS European workshop beyond the PC: new challenges for the operating system - EW 9  
Our architecture is targeted at application developers and administrators, and it supports mobile computations, persistent storage, and resource discovery within a single, comprehensive framework.  ...  But, while hardware and networking infrastructure to realize this vision are increasingly becoming a reality, precious few applications run in this infrastructure.  ...  In a pervasive computing environment, discovery lets mobile devices access resources on the network.  ... 
doi:10.1145/566752.566763 fatcat:jjkuzgu2gbdnzazcl222455zu4

A system architecture for pervasive computing

Robert Grimm, Tom Anderson, Brian Bershad, David Wetherall
2000 Proceedings of the 9th workshop on ACM SIGOPS European workshop beyond the PC: new challenges for the operating system - EW 9  
Our architecture is targeted at application developers and administrators, and it supports mobile computations, persistent storage, and resource discovery within a single, comprehensive framework.  ...  But, while hardware and networking infrastructure to realize this vision are increasingly becoming a reality, precious few applications run in this infrastructure.  ...  In a pervasive computing environment, discovery lets mobile devices access resources on the network.  ... 
doi:10.1145/566726.566763 dblp:conf/sigopsE/GrimmABW00 fatcat:bgrtsscvf5f6joakeg2qzqwjwq

Vesta: A secure and autonomic system for pervasive healthcare

Yanmin Zhu, Morris Sloman, Emil Lupu, Sye Loong Keoh
2009 Proceedings of the 3d International ICST Conference on Pervasive Computing Technologies for Healthcare  
This paper describes a body sensor network comprising a personal controller, various biosensors and actuators for pervasive healthcare.  ...  Finegrained access control of the system is realized through authorization policies. Experimental evaluation shows that it is viable and practical for real-world pervasive healthcare.  ...  for resource-constrained pervasive systems in healthcare scenarios.  ... 
doi:10.4108/icst.pervasivehealth2009.5939 dblp:conf/ph/ZhuSLK09 fatcat:fqoyfvzvnvenvgsr6ehte32zua

Access-controlled resource discovery for pervasive networks

Sanjay Raman, Dwaine Clarke, Matt Burnside, Srinivas Devadas, Ronald Rivest
2003 Proceedings of the 2003 ACM symposium on Applied computing - SAC '03  
This system achieves this goal by integrating access control with the Intentional Naming System (INS), a resource discovery and service location system.  ...  This paper describes the design and implementation of an architecture for access-controlled resource discovery.  ...  Resource discovery is vital to enabling operation in pervasive networks as the network state is unpredictable. The dynamism of pervasive networks also brings rise to problems of security.  ... 
doi:10.1145/952589.952600 fatcat:2zucusxyxbaone5naxfn54aci4

Access-controlled resource discovery for pervasive networks

Sanjay Raman, Dwaine Clarke, Matt Burnside, Srinivas Devadas, Ronald Rivest
2003 Proceedings of the 2003 ACM symposium on Applied computing - SAC '03  
This system achieves this goal by integrating access control with the Intentional Naming System (INS), a resource discovery and service location system.  ...  This paper describes the design and implementation of an architecture for access-controlled resource discovery.  ...  Resource discovery is vital to enabling operation in pervasive networks as the network state is unpredictable. The dynamism of pervasive networks also brings rise to problems of security.  ... 
doi:10.1145/952532.952600 dblp:conf/sac/RamanCBDR03 fatcat:jyvsozoo35huxidzpkn25w5bme

Semantic-Based Knowledge Dissemination and Extraction in Smart Environments

M. Ruta, F. Scioscia, E. Di Sciascio, D. Rotondi, S. Piccione
2013 2013 27th International Conference on Advanced Information Networking and Applications Workshops  
Logic-based standard and non-standard inference services can be exploited in matchmaking and negotiation for service/resource discovery and on-the-fly reasoning, as well as for large-scale analyses.  ...  way, without requiring a central control and coordination.  ...  ); effectiveness of resource discovery is high (multiple resources were retrieved in over 90% of tests); discovery duration is slightly high (1.5-2.5 s) w.r.t. the requirements of pervasive computing scenarios  ... 
doi:10.1109/waina.2013.249 dblp:conf/aina/RutaSSRP13 fatcat:d43rbifwmvd2dpjvegte4dxs5e

Social computing networks

Naeem Esfahani, Sam Malek
2010 Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - ICSE '10  
Hence, the discovery mechanism needs to take into account accessibility, trust, and availability of the resources within one's turf network. For each resource, the search is performed in three steps.  ...  to those that comply with the CellPhone specification from the domain ontology; finally, the complying resources to which Agnes has access are selected (recall from Section 3.1 that access control defines  ... 
doi:10.1145/1810295.1810319 dblp:conf/icse/EsfahaniM10 fatcat:xqemk4vp6rfo7d5ygl34ulpgka

A Survey of Security Middleware for Pervasive and Ubiquitous Systems

Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah Al-Abdouli, Nader Mohamed
2009 2009 International Conference on Network-Based Information Systems  
Middleware is an essential component in this field and recently more emphasis has been put on security middleware as an enabling component for pervasive and ubiquitous applications.  ...  Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields.  ...  Delegation rights control is very important in the matter in giving un-authorized user or objects a right to access services and resources.  ... 
doi:10.1109/nbis.2009.31 dblp:conf/nbis/Al-JaroodiAAM09 fatcat:5mpt4b24cjhynhop3dveyrw6ve

Standards, tools & best practices - The universal remote console: a universal access bus for pervasive computing

B. LaPlant, S. Trewin, G. Zimmermann, G. Vanderheiden
2004 IEEE pervasive computing  
A URC can use any form of networking to access Resources via a Resource-URC Network (RUN). The URC standard doesn't specify the mechanism by which a URC accesses Supplemental Resources.  ...  that combine to enable remote user interfaces and remote control of network-accessible Targets through a URC.  ... 
doi:10.1109/mprv.2004.1269134 fatcat:22exl2oso5euhewe25luihlz5q

Mobility Across Multiple Technologies -the Daidalos Approach

Piotr PACYNA, Janusz GOZDECKI, Krzysztof LOZIAK, Andrzej JAJSZCZYK
2006 Interdisciplinary Information Sciences  
It is being tested in different network environments of single-hop radio access networks (802.11, 802.16, TD-CDMA) and broadcast networks (DVB-T).  ...  It will also be tested soon in multi-hop ad-hoc (802.11e) and in moving networks (NEMO).  ...  The authors wish to thank the partners of the Daidalos Consortium, in particular partners of WP2 and WP3 for their collaborative work.  ... 
doi:10.4036/iis.2006.127 fatcat:aph3sh2iwzhrrouxblwklyhubu

Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments [chapter]

Anupam Joshi, Timothy Finin, Yelena Yesha
2002 Lecture Notes in Computer Science  
In particular, we describe our ongoing projects that have used DAML for service discovery, service composition, data management, and trust based security in pervasive computing environments.  ...  Increasing computational capabilities and decreasing costs of commonly used devices, and the concomitant development of short range, ad-hoc networking technologies, will help realize the pervasive computing  ...  Conclusions We have described the work of the eBiquity group at UMBC toward building a framework that enables discovery, composition and management of services and information in a pervasive computing  ... 
doi:10.1007/3-540-36189-8_20 fatcat:jjfoovh5dne2piqlquyycnpe3y
« Previous Showing results 1 — 15 out of 31,480 results