Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
Reworking the RPC paradigm for mobile clients
Mobile Networks and Applications - Special issue on mobile computing and system services
Delegating remote operation execution in a mobile computing environment
Mobile Networks and Applications - Special issue on mobile computing and system services
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Selected Papers in Network and System Administration
Selected Papers in Network and System Administration
Smart Mobs: The Next Social Revolution
Smart Mobs: The Next Social Revolution
Policy-Driven Binding to Information Resources in Mobility-Enabled Scenarios
MDM '03 Proceedings of the 4th International Conference on Mobile Data Management
A secure infrastructure for service discovery and access in pervasive computing
Mobile Networks and Applications - Security in mobile computing environments
Agent-Based Configuration Management of Distributed Applications
ICCDS '96 Proceedings of the 3rd International Conference on Configurable Distributed Systems
A graph-theoretical model of computer security: From file sharing to social engineering
International Journal of Information Security
LISA '98 Proceedings of the 12th USENIX conference on System administration
Virtual appliances in the collective: a road to hassle-free computing
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
An approach to understanding policy based on autonomy and voluntary cooperation
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Scalability of Peer Configuration Management in Logically Ad Hoc Networks
IEEE Transactions on Network and Service Management
A reliable asynchronous RPC architecture for wireless networks
Computer Communications
Network patterns in cfengine and scalable data aggregation
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
Estimating Reliability of Conditional Promises
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
Modeling Change Without Breaking Promises
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
Understanding Promise Theory Using Rewriting Logic
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
A promise theory approach to collaborative power reduction in a pervasive computing environment
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Hi-index | 0.00 |
The advent of pervasive computing is moving us towards a new paradigm for computing in terms of ad hoc services. This carries with it a certain risk, from a security and management viewpoint. Users become increasingly responsible for their own hosts. A form of service transaction based on minimal trust is discussed. A proof of concept implementation of nondemand (voluntary) services is discussed for pervasive computing environments. 'Voluntary Remote Procedure Call' is a test-implementation of the proposed protocol integrated into cfengine, to show how voluntary cooperation of nodes can allow a cautious exchange of collaborative services, based on minimal trust. An analysis of implementation approaches followed by a discussion of the desirability of this technology is presented.