Filters








5,738 Hits in 5.7 sec

Secure Sharing of Tuple Spaces in Ad Hoc Settings

Radu Handorean, Gruia-Catalin Roman
2003 Electronical Notes in Theoretical Computer Science  
Mobile applications executing over ad hoc wireless networks present designers with a rather distinct set of security requirements.  ...  The paper explains the design strategy used to add security support in Lime and its implications for the development of mobile applications over ad hoc networks.  ...  Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the research sponsors.  ... 
doi:10.1016/s1571-0661(04)80688-1 fatcat:aulp6blhrnfinp6jsyfyvqvsg4

Secure Sharing of Tuple Spaces in Ad Hoc Settings**Please see WUCSE-03-26**

Gruia-Catalin Roman
2002
Mobile applications executing over ad hoc wireless networks present designers with a rather distinct set of security requirements.  ...  Mobile applications executing over ad hoc wireless networks present designers with a rather distinct set of security requirements.  ...  Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the research sponsors.  ... 
doi:10.7936/k7k35s0z fatcat:4kdcukm25zh4hik7dgusjfnzvy

Secure Sharing of Tuple Spaces in Ad Hoc Settings**Please see WUCSE-03-26**

Gruia-Catalin Roman
2002
In ad hoc settings this must be achieved without reliance on any central point of control.  ...  Practical applications of coordination models demand appropriate security guarantees. In ad hoc settings this must be achieved without reliance on any central point of control.  ...  Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.7936/k7pv6hph fatcat:fkcem7owejgd5l5lxs7r2ghoh4

Secure Service Provision in Ad Hoc Networks [chapter]

Radu Handorean, Gruia-Catalin Roman
2003 Lecture Notes in Computer Science  
This paper describes a service provision model designed specifically for use in ad hoc settings.  ...  Ad hoc networks are formed opportunistically as mobile devices come within wireless communication range of each other.  ...  This represents yet another major challenge to service provision in ad hoc settings.  ... 
doi:10.1007/978-3-540-24593-3_25 fatcat:nrwqhovuhfad7ef52jvtwel3pm

Principles of Mobile Computing Middleware [chapter]

Cecilia Mascolo, Licia Capra, Wolfgang Emmerich
2005 Middleware for Communications  
Mobile Ad-Hoc Systems Mobile ad-hoc (or simply ad-hoc) distributed systems consist of a set of mobile hosts, connected to the network through wireless links.  ...  In Linda, a tuple space is a globally shared, associatively addressed memory space used by processes to communicate.  ... 
doi:10.1002/0470862084.ch11 fatcat:gzewugfx6zayjd3lyxzuiwyyee

Adaptive Access Control in Coordination-Based Mobile Agent Systems [chapter]

Christine Julien, Jamie Payton, Gruia-Catalin Roman
2005 Lecture Notes in Computer Science  
In this paper, we explore context-aware access control policies tailored to the needs of agent coordination in open environments that exhibit mobility.  ...  We propose and evaluate novel constructs to support such policies, especially in the presence of large numbers of highly dynamic application agents.  ...  Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the Office of Naval Research.  ... 
doi:10.1007/978-3-540-31846-0_15 fatcat:6mmiox3hkvgg3gyp7l6gqtqali

Trends in Middleware for Mobile Ad Hoc Networks

Salem Hadim, Jameela Al-Jaroodi, Nader Mohamed
2006 Journal of Communications  
At the same time mobile wireless ad hoc networks (MANET) have become a popular distributed environment and its application domain is expanding rapidly.  ...  The use of middleware has extended from simply facilitating applications' communication to a broad set of services supporting a huge spectrum of networked and distributed computing environments.  ...  ACKNOWLEDGMENT The authors wish to thank the editors of the Journal of Communications (JCM) for their invitation to contribute with this paper.  ... 
doi:10.4304/jcm.1.4.11-21 fatcat:phdhpwhnkvdgbij3gen5jgpbre

Mobile Computing Middleware [chapter]

Cecilia Mascolo, Licia Capra, Wolfgang Emmerich
2002 Lecture Notes in Computer Science  
to frequent and unannounced changes in the environment, such as high variability of network bandwidth, and in the resources availability.  ...  To support designers building mobile applications, research in the field of middleware systems has proliferated.  ...  The authors would like to thank Zuhlke Engineering (UK) Ltd. for supporting Licia Capra; Stefanos Zachariadis and Gian Pietro Picco for comments on an earlier draft of this paper.  ... 
doi:10.1007/3-540-36162-6_2 fatcat:fuuhn5ybhfffdlevnln72tkp2q

A Lightweight Coordination Middleware for Mobile Computing [chapter]

Chien-Liang Fok, Gruia-Catalin Roman, Gregory Hackmann
2004 Lecture Notes in Computer Science  
This asymmetric style of coordination allows each agent to focus only on relevant peers. Coordination activi-ties are restricted solely to tuple spaces owned by agents in the acquaintance list.  ...  This asymmetric style of coordination allows each agent to focus only on relevant peers. Coordination activi-ties are restricted solely to tuple spaces owned by agents in the acquaintance list.  ...  Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the research sponsors.  ... 
doi:10.1007/978-3-540-24634-3_12 fatcat:mmav2kaolvh7xcellk4yczt4re

Egocentric context-aware programming in ad hoc mobile environments

Christine Julien, Gruia-Catalin Roman
2002 Proceedings of the tenth ACM SIGSOFT symposium on Foundations of software engineering - SIGSOFT '02/FSE 10  
EgoSpaces focuses on the needs of application development in ad hoc environments by proposing an agent-centered notion of context, called a view, whose scope extends beyond the local host to data and resources  ...  EgoSpaces focuses on the needs of application development in ad hoc environments by proposing an agent-centered notion of context, called a view, whose scope extends beyond the local host to data and resources  ...  Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/587051.587056 dblp:conf/sigsoft/JulienR02 fatcat:orkddgsflra6pphjbilmiuakue

Establishment of Ad-Hoc Communities through Policy-Based Cryptography

Walid Bagga, Stefano Crosta, Pietro Michiardi, Refik Molva
2007 Electronical Notes in Theoretical Computer Science  
Then, we describe an application of policy-based encryption in the context of ad-hoc networks.  ...  More precisely, we show how the policy-based encryption primitive can be used to achieve a privacy-enhanced secure establishment of ad-hoc communities.  ...  of ad-hoc networks.  ... 
doi:10.1016/j.entcs.2006.11.013 fatcat:etvfvtlxtfe4tehl4beeoddwmu

Context aware session management for services in ad hoc networks

R. Handorean, R. Sen, G. Hackmann, G.-C. Roman
2005 2005 IEEE International Conference on Services Computing (SCC'05) Vol-1  
However, certain technical concerns relating to reliable interactions among hosts in ad hoc networks have not yet received much attention.  ...  We show how follow-me sessions mitigate issues related to proxy-based service-oriented architectures in ad hoc networks, making them more reliable.  ...  Any opinions, findings, and conclusions expressed in this paper are those of the authors and do not necessarily represent the views of the research sponsors.  ... 
doi:10.1109/scc.2005.40 dblp:conf/IEEEscc/HandoreanSHR05 fatcat:negtvqqtwraf3n4ido7aahrd3m

Developing Mobile Applications [chapter]

Gruia-Catalin Roman, Amy Murphy, Gian Pietro Picco
2004 Mobile Computing Handbook  
The context for computation, represented in Linda by a single, globally accessible, persistent tuple space, is reinterpreted in LIME as the transient sharing of the tuple spaces carried by individual mobile  ...  The resulting model provides a minimalist set of abstractions that promise to facilitate rapid and dependable development of mobile applications.  ...  Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the research sponsors.  ... 
doi:10.1201/9780203504086.ch2 fatcat:chdczzdpuffiblsulxthedser4

A Declarative Approach to Agent-Centered Context-Aware Computing in Ad Hoc Wireless Environments [chapter]

Roman Gruia-Catalin, Christine Julien, Amy L. Murphy
2003 Lecture Notes in Computer Science  
We propose a new notion of context, which includes in principle any information reachable via the ad hoc network infrastructure but is restricted in practice to specific views of the overall context.  ...  the application level, mobility of hosts in the physical space, and the migration of code among hosts.  ...  An agent's location is always a host, while a host's location is always a point in some physical or logical space. An ad hoc network is defined as a closed set of reachable hosts.  ... 
doi:10.1007/3-540-35828-5_6 fatcat:udo2glxwmvarnbdjcr5mazz46a

Coordination and mobility in CoreLime

BOGDAN CARBUNAR, MARCO TULIO VALENTE, JAN VITEK
2004 Mathematical Structures in Computer Science  
feature, namely transient sharing of tuple spaces.  ...  Our contribution is thus an exploration of the language design space rather than a theoretical investigation of properties of these models.  ...  Furthermore, ad hoc federations of hosts can be created dynamically. In this case, Lime merges the tuple spaces of each host into a single seamless federated tuple space.  ... 
doi:10.1017/s0960129504004177 fatcat:3svaodi5jjharjfj2vjckwjozu
« Previous Showing results 1 — 15 out of 5,738 results