Obtaining resource controllability in service cooperation environments

S. Chen, J.J. Lukkien

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Abstract

In a ubiquitous computing environment, devices host services that are accessed by anonymous users. This causes threats of resource abuse through malicious attacks or resource scarcity through unintentional excessive service invocations. In this paper, the secure resource control for service sharing is presented which depends on two basic functionalities: access control and soft-state management. Services are grouped into virtual communities for secure access. Service cooperation through external orchestration can only be done within a virtual community. Services can be activated/deactivated by a device management service running on their host devices. Real-time resource utilization of services for virtual community applications is monitored. Therefore, resources on a shared device can be protected from malicious use and become controllable for special quality of service provisioning.
Original languageEnglish
Title of host publicationProceedings 7th International ACM Conference on Mobile and Ubiquitous Multimedia (MUM'08, Umeå, Sweden, December 3-5, 2008)
Place of PublicationNew York
PublisherAssociation for Computing Machinery, Inc
Pages109-112
ISBN (Print)978-1-60558-192-7
DOIs
Publication statusPublished - 2008

Fingerprint Dive into the research topics of 'Obtaining resource controllability in service cooperation environments'. Together they form a unique fingerprint.

  • Cite this

    Chen, S., & Lukkien, J. J. (2008). Obtaining resource controllability in service cooperation environments. In Proceedings 7th International ACM Conference on Mobile and Ubiquitous Multimedia (MUM'08, Umeå, Sweden, December 3-5, 2008) (pp. 109-112). New York: Association for Computing Machinery, Inc. https://doi.org/10.1145/1543137.1543160