By Topic

Distributed Systems Online, IEEE

Issue 9 • Date Sept. 2004

Filter Results

Displaying Results 1 - 5 of 5
  • A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures

    Page(s): 1
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (328 KB)  

    Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine networks, processors, and devices with mechanisms, protocols, and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems that are isolated from the public Internet and are context insensitive. This leads to multiple, incompatible subsystems incapable of interoperating, thus making operations, management, and trust difficult. The Heterogeneous Survivable Trusted Information-Assurance Architecture addresses the problem of securing critical information services in large-scale ubiquitous computing environments. Hestia is a programmable middleware solution implemented as a network of middleboxes. These middleboxes form protective layers that isolate CCI services and mediate authorized access to Hestia’s services. They also provide a programmable, distributed, object-oriented framework that enables the integration of security, privacy, and reliability mechanisms in service-access interfaces and implementations. View full abstract»

    Open Access
  • Service Continuity in Networked Control Using Etherware

    Page(s): 2
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (256 KB)  

    Service continuity is the capability to provide persistent and reliable service, with graceful degradation in the presence of changes. This is particularly important for networked control systems interacting with the real world, as they have strict safety requirements and must tolerate changes such as component failures and upgrades while maintaining operational integrity. The authors describe how they address these issues in Etherware, their middleware for networked control. View full abstract»

    Open Access
  • Wi-Fi Could Augment GPS

    Page(s): 3
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (144 KB)  

    Researchers are looking at ways to use base stations for Wi-Fi, cellular phones, and Bluetooth to help people find directions in major metropolitan areas. View full abstract»

    Open Access
  • Delivering the Promise of the Storage Area Network

    Page(s): 4
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (144 KB)  

    Recent developments in virtualization technology represent a major advance in the control and management of digital data storage. View full abstract»

    Open Access
  • World Wide Wisdom

    Page(s): 5
    Save to Project icon | Request Permissions | PDF file iconPDF (93 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE DS Online provides constantly updated, expert-moderated material in such areas as cluster computing, grid computing, security, and middleware.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Jean Bacon
Univ. of Cambridge
Computer Laboratory