Filters








22,340 Hits in 7.2 sec

Security requirements in service oriented architectures for ubiquitous computing

Domenico Cotroneo, Almerindo Graziano, Stefano Russo
2004 Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing -  
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature.  ...  Second, to highlight architectural issues, including technologies and trade offs, in the design and implementation of a secure service oriented architecture for ubiquitous computing.  ...  service architectures in ubiquitous computing.  ... 
doi:10.1145/1028509.1028522 dblp:conf/middleware/CotroneoGR04 fatcat:nlcdtapuvvfxrcx4dwkzy4rtpi

Distributed Systems to Support Efficient Adaptation for Ubiquitous Web [chapter]

Claudia Canali, Sara Casolari, Riccardo Lancellotti
2005 Lecture Notes in Computer Science  
The ubiquitous Web will require many adaptation and personalization services which will be consumed by an impressive amount of different devices and classes of users.  ...  architectures will be the common basis for the delivery platform.  ...  Conclusions In this paper we proposed two novel distributed architectures for the deployment of content adaptation services that enable Ubiquitous Web access.  ... 
doi:10.1007/11557654_119 fatcat:qkid4ie425csdchl6tql5l7mfy

Recent advanced applications and services for intelligent ubiquitous environments

Jongsung Kim, Han-Chieh Chao, Uyen Trang Nguyen
2014 Electronic Commerce Research  
This special issue aims to foster the dissemination of high quality research in any new theory, technique, and research related to recent advanced services computing technology for IUEs, as well as to  ...  Intelligent ubiquitous environments (IUEs) are a new paradigm that offers computing and communication services at any time and anywhere.  ...  -Mobile/ubiquitous/pervasive quality of service (QoS) adaptation -Software-defined radio, reconfigurable radio network -Service-oriented architecture (SOA) -Telecommunication Services -Service-oriented  ... 
doi:10.1007/s10660-014-9142-7 fatcat:ronly3qfpvckjlmv5rq6nsqg4i

A Reference Architecture Based on Web Components for Ubiquitous Information Systems

Cesar Alvarez, J. Harold Pardue
2003 Americas Conference on Information Systems  
This architecture is a Web-centric synthesis of layered and service-oriented architectural styles with object-oriented patterns designed to provide a blueprint for constructing information systems that  ...  Designing and deploying ubiquitous information systems requires a framework or architecture for conceptualizing how to structure and integrate existing and emerging technologies and end systems.  ...  Conceptually, the architecture described here, the Ubiquitous Information System Architecture (UISA), is a synthesis of layered and service-oriented architectures.  ... 
dblp:conf/amcis/AlvarezP03 fatcat:kbvefoub7jaaxm4pzu4iebfbze

Towards Ubiquitous AI in 6G with Federated Learning [article]

Yong Xiao and Guangming Shi and Marwan Krunz
2020 arXiv   pre-print
We propose an FL-based network architecture and discuss its potential for addressing some of the novel challenges expected in 6G.  ...  Although it still in an early stage of development, FL-inspired architecture has been recognized as one of the most promising solutions to fulfill ubiquitous AI in 6G.  ...  Luiz DaSilva at the CONNECT, Trinity College Dublin, for useful comments on this manuscript.  ... 
arXiv:2004.13563v1 fatcat:r4lc2x7j4zf2xkxr4xzklf2jbq

Ubiquitous computing environments and its usage access control

Hua Wang, Yanchun Zhang, Jinli Cao
2006 Proceedings of the 1st international conference on Scalable information systems - InfoScale '06  
In this paper, we present a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents.  ...  This ubiquitous computing poses new security challenges while the information can be accessed at anywhere and anytime because it may be applied by criminal users.  ...  SECURITY ARCHITECTURE In this section, we discuss architecture solutions for ubiquitous computing access control based on reference monitors.  ... 
doi:10.1145/1146847.1146853 dblp:conf/infoscale/WangZC06 fatcat:sgnxg2m5vfh4jaq6mr36jdesru

Distributed Computing for Ubiquitous Systems

Mona Mani
2011 International journal of computer and communication technology  
It also specifies respective changes, and demand for new or adapted architecture/platform, to accommodate it for an efficient ubiquitous system.  ...  Moreover, it also discusses significant role of Tini InterNet Interface - a technology used in DIICS, for embedded device support in ubiquitous systems.  ...  In the multi server system each server generally stands for some task specific services.  ... 
doi:10.47893/ijcct.2011.1080 fatcat:uvkdmjz4zvhkfcfks33pzpi4ku

Security middleware approaches and issues for ubiquitous applications

Jameela Al-Jaroodi, Imad Jawhar, Alyaziyah Al-Dhaheri, Fatmah Al-Abdouli, Nader Mohamed
2010 Computers and Mathematics with Applications  
Middleware is an essential layer in the architecture of these new systems, and recently, more emphasis has been put on security middleware as an enabling component for ubiquitous applications.  ...  Recently, ubiquitous computing and pervasive environments evolved tremendously and became an integral part of many fields and application domains.  ...  We would also like to thank the anonymous reviewers for their valuable comments and suggestions that helped us produce a more concise article.  ... 
doi:10.1016/j.camwa.2010.01.009 fatcat:ds73w7jfo5ejvpdpwlgtmq2lba

Design of a Security Management Middleware in Ubiquitous Computing Environments

Zhefan Jiang, Kanghee x Kanghee Lee, Sangok Kim, Hyunchul Bae, Sangwook Kim, Soongju Kang
2005 Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05)  
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-centric security.  ...  It also provides management services which can monitor and control the managed objects and sensors for the domain security management.  ...  Ubiquitous computing needs application-oriented security, therefore, a new adaptive security management model is required.  ... 
doi:10.1109/pdcat.2005.120 dblp:conf/pdcat/JiangLKBKK05 fatcat:4xzvvk4il5dhzcbop64hi5fgu4

An ontology-enabled Service Oriented Architecture for pervasive computing

Q. Ni, M. Sloman
2005 International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II  
In this paper, we propose a new Ontology-enabled Service Oriented Architecture (OSOA) for Pervasive Computing that is built on Web Services architecture, and incorporates Universal Plug and Play (UPnP)  ...  OSOA aims to combine context awareness and humancentric requirements related to ubiquitous computing with a new ontology-based approach to ad-hoc and goal-driven service composition.  ...  Ontologies allow a better solution for service composition and human centered computing.  ... 
doi:10.1109/itcc.2005.84 dblp:conf/itcc/NiS05 fatcat:gkuopequord5pkqsafewssfdqi

Ubiquitous Health Care Monitoring Services (UHCMS): Review of Opportunities and Challenges

Norah I. Alsaeed, Nouf S. Aldahwan
2020 International Journal of Computer Applications  
Keywords Ubiquitous computing, Ubiquitous health care, health care monitoring systems, IoT-based health care services.  ...  This study aims to review UHCMS literature for the last two years to understand the researches' contributions and shortages in this field and discuss the literature gap for further investigations.  ...  Therefore, ubiquitous computing offers significant opportunities for health care monitoring services.  ... 
doi:10.5120/ijca2020920631 fatcat:3iiqe4667baynbzflrkghb2kxa

Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey

G. Jagadamba, B. Sathish Babu
2017 Indian Journal of Science and Technology  
Objectives: To present the principle of working of some of the widely used adaptive security schemes in the domain of ubiquitous computing.  ...  Application/ Improvements: The proposed framework can be used to applications built in the Ubiquitous Computing Environment (UCE) such as Ubiquitous-healthcare, U-learning, U-smart campus, and so on.  ...  A trust-based service management for each node participating as the service provider or a service requester in service-oriented MANETs (Mobile AdHoc Networks) was proposed 54 for effective trust management  ... 
doi:10.17485/ijst/2016/v9i48/89396 fatcat:xf5kghfkqnh3dg5lfdgzmxrqsq

Advanced manufacturing systems and enterprises: Cloud and ubiquitous manufacturing and an architecture

Putnik Goran
2012 Istrazivanja i projektovanja za privredu  
*aaS (Everything as a Service) all of which imply a service-oriented architecture."  ...  In this context, resources are seen as services, essentially. This manufacturing service-oriented network can stimulate productionoriented to service-oriented manufacturing [01] .  ...  ACKNOWLEGMENTS The authors wish to acknowledge the support of: 1) The Foundation for Science and Technology -FCT, Project PTDC/EME-GIN/102143/2008, 'Ubiquitous oriented embedded systems for globally distributed  ... 
doi:10.5937/jaes10-2511 fatcat:z4hkctk5pbab3ara353357wxl4

Context Aware Multisensor Image Fusion for Military Sensor Networks using Multi-Agent system

Ashok V. Sutagundar, S. S. Manvi
2020 Zenodo  
The scheme is simulated for testing its operation effectiveness in terms of fusion time, mean square error, throughput, dropping rate, bandwidth requirement, node battery usage and agent overhead.  ...  The fusing agent uses wavelet transform for fusion.  ...  Tools  Modeling and Performance Evaluation Ubiquitous ComputingArchitectural Structure, Design Decisions and Philosophies  Autonomic Management of Ubiquitous Systems  Context and Location Awareness  ... 
doi:10.5281/zenodo.4310984 fatcat:r3b4cyw4crgcvgtoyshfjj5bna

A Generic Service Architecture for Secure Ubiquitous Computing Systems

Shudong Chen, Johan Lukkien, Richard Verhoeven
2012 International Journal of Communications, Network and System Sciences  
The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices.  ...  However, architectures, services interfaces and network implementation of the existing service-oriented systems differ case by case.  ...  Their invaluable feedback helped substantially in improving the quality of the paper.  ... 
doi:10.4236/ijcns.2012.51007 fatcat:5pzruvwq6vdzvgpdbgtwfqzn2m
« Previous Showing results 1 — 15 out of 22,340 results