Condor-G: A Computation Management Agent for Multi-Institutional Grids
Cluster Computing
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Customizable Service State Durability for Service Oriented Architectures
EDCC '06 Proceedings of the Sixth European Dependable Computing Conference
Session state: beyond soft state
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
QoS management in distributed service oriented systems
PDCN'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: parallel and distributed computing and networks
VICSDA: using virtual communities to secure service discovery and access
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Journal of Ambient Intelligence and Smart Environments
Journal of Ambient Intelligence and Smart Environments
Hi-index | 0.00 |
In a ubiquitous computing environment, devices host services that are accessed by anonymous users. This causes threats of resource abuse through malicious attacks or resource scarcity through unintentional excessive service invocations. In this paper, the secure resource control for service sharing is presented which depends on two basic functionalities: access control and soft-state management. Services are grouped into virtual communities for secure access. Service cooperation through external orchestration can only be done within a virtual community. Services can be activated/deactivated by a device management service running on their host devices. Real-time resource utilization of services for virtual community applications is monitored. Therefore, resources on a shared device can be protected from malicious use and become controllable for special quality of service provisioning.