The design and implementation of an intentional naming system
Proceedings of the seventeenth ACM symposium on Operating systems principles
An architecture for secure wide-area service discovery
Wireless Networks - Selected Papers from Mobicom'99
Proxy-based security protocols in networked mobile devices
Proceedings of the 2002 ACM symposium on Applied computing
The Jini Specifications
Metadata models for QoS-aware information management systems
SEKE '02 Proceedings of the 14th international conference on Software engineering and knowledge engineering
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
Cryptography in an Unbounded Computational Model
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
A Context-Aware Security Architecture for Emerging Applications
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Access-controlled resource discovery for pervasive networks
Proceedings of the 2003 ACM symposium on Applied computing
Exploring Privacy Issues in Web Services Discovery Agencies
IEEE Security and Privacy
Secure context-sensitive authorization
Pervasive and Mobile Computing
Efficient Context-aware Service Discovery in Multi-Protocol Pervasive Environments
MDM '06 Proceedings of the 7th International Conference on Mobile Data Management
A multi-protocol framework for ad-hoc service discovery
Proceedings of the 4th international workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006)
INDISS: interoperable discovery system for networked services
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Enterprise modeling in a service oriented architecture
Proceedings of the International Workshop on Enterprises & Organizational Modeling and Simulation
Hi-index | 0.00 |
This work addresses the existing research gap regarding the security of service oriented architectures and their integration in the context of nomadic computing. The state of the art of Service Oriented Architectures (SOAs) is thoroughly investigated to understand what secure service provision means for different SOAs and whether an established notion of secure SOA existed. Based on the analysis of existing SOAs, we define a set of requirements for securing services among different nomadic computing domains. Such requirements concern the security of service registration and that of the discovery and delivery phases. The surveyed SOAs are then evaluated in the light of the defined requirements, revealing interesting observations about how current SOAs address security issues. The second part of this work addresses the research issue of achieving secure service provision in a nomadic computing environment characterized by a number of heterogeneous service oriented architectures. A solution is presented in the form of an architectural model, named Secure Nomadic Computing Architecture. The model relies on a novel three-phase discovery-delivery protocol which allows the enforcement of a number of security requirements, identified as a result of the first part of the work. Finally, we present an exemplary implementation of the proposed architectural model developed within the context of a distributed management information system for the discovery of digital educational content.