Advertisement

On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management

  • Ovidiu V. Drugan
  • Ioanna Dionysiou
  • David E. Bakken
  • Thomas P. Plagemann
  • Carl H. Hauser
  • Deborah A. Frincke
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3694)

Abstract

Distributed computing is widely expected to become ubiquitous over the next decade. Distributed services such as those provided by Service Oriented Architectures which will support this ubiquity must meet many requirements at both runtime and over their lifecycle. Composability is one key requirement for such services. In this paper we provide refined definitions of composability as it applies to such distributed services, encompassing both hardware and software. We then analyze these composability issues as they apply to two middleware frameworks which support critical infrastructures. The first examines composability issues for resource management infrastructure for a framework that provides middleware services for ad hoc mobile networks designed to support emergency rescue coordination. The second investigates composability issues involved with trust management for status dissemination for the electric power grid.

Keywords

Trust Relationship Trust Management Critical Infrastructure Serial Composability Event Server 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Zinky, J.A., Bakken, D.E., Schantz, R.E.: Architectural support for quality of service for CORBA objects. Theory and Practice of Object Systems 3, 55–73 (1997)CrossRefGoogle Scholar
  2. 2.
    Venkatasubramanian, N.: Safe composability of middleware services. Communications of the ACM 45, 49–52 (2002)CrossRefGoogle Scholar
  3. 3.
    Werner, M., Richling, J., Milanovic, N., Stantchev, V.: Composability concept for dependable embedded systems. In: Proceedings of the International Workshop on Dependable Embedded Systems at the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), Florence, Italy (2003)Google Scholar
  4. 4.
    Milanovic, N., Malek, M.: Architectural support for automatic service composability. unpublished manuscript, available at (2005), http://www.informatik.hu-berlin.de/~milanovi/scc2005.pdf
  5. 5.
    Mishra, S., Schlichting, R.: Abstractions for constructing dependable distributed systems. Technical Report TR 92 -12, University of Arizona (1992)Google Scholar
  6. 6.
    Schantz, R., Schmidt, D.: Middleware for Distributed Systems - Evolving the Common Structure for Network-centric Applications. In: The Encyclopedia of Software Engineering, pp. 801–813. John Wiley and Sons, Chichester (2001)Google Scholar
  7. 7.
    Chandra, P., Chu, Y.H., Fisher, A., Gao, J., Kosak, C., Ng, T.E., Steenkiste, P., Takahashi, E., Zhang, H.: Darwin: Customizable resource management for value-added network services. IEEE Network 15, 22–35 (2001)CrossRefGoogle Scholar
  8. 8.
    Skjelsvik, K.S., Goebel, V., Plagemann, T.: A highly available distributed event notification service for mobile ad-hoc networks. In: ACM/IFIP/USENIX 5th International Middleware Conference (Middleware 2004), Toronto, Canada (2004)Google Scholar
  9. 9.
    Perkins, C., Belding-Royer, E., Das, S.: RFC 3561: Ad hoc on-demand distance vector (aodv) routing (2003)Google Scholar
  10. 10.
    Phanse, K.S., DaSilva, L.A., Midkiff, S.F.: Design and demonstration of policy-based management in a multi-hop ad hoc network. In: Ad Hoc Networks. Elsevier Science, Amsterdam (2003)Google Scholar
  11. 11.
    Cardei, I., Varadarajan, S., Pavan, A., Graba, L., Cardei, M., Min, M.: Resource management for ad-hoc wireless networks with cluster organization. Journal of Cluster Computing in the Internet 7, 91–103 (2004)CrossRefGoogle Scholar
  12. 12.
    Lee, S.B., Ahn, G.S., Zhang, X., Campbell, A.T.: INSIGNIA: An ip-based quality of service framework for mobile ad hoc networks. Journal of Parallel and Distributed Computing, Special issue on wireless and mobile computing and communications 60, 374–406 (2000)Google Scholar
  13. 13.
    Ahn, K.M., Kim, S.: Optimal bandwidth allocation for bandwidth adaptation in wireless multimedia networks. In: Computers and Operations Research, vol. 30, pp. 1917–1929. Elsevier Science, Amsterdam (2003); ad hoc, wireless networks hotspots, mutimediaGoogle Scholar
  14. 14.
    Pei, G., Gerla, M.: Mobility management for hierarchical wireless networks. Mobile Networks and Applications archive 6, 331–337 (2001)zbMATHCrossRefGoogle Scholar
  15. 15.
    Chen, K., Shah, S.H., Nahrstedt, K.: Cross-layer design for data accessibility in mobile ad hoc networks. Special Issue on Multimedia Network Protocols and Enabling Radio Technologies 21, 49–75 (2002)Google Scholar
  16. 16.
    Li, B., Wang, K.H.: NonStop: Continuous multimedia streaming in wireless ad hoc networks with node mobility. IEEE Journal on Selected Areas in Communications 21, 1627–1641 (2003)CrossRefGoogle Scholar
  17. 17.
    Storey, M., Blair, G., Friday, A.: MARE: resource discovery and configuration in ad hoc networks. Mobile Networks and Applications 7, 377–387 (2002)zbMATHCrossRefGoogle Scholar
  18. 18.
    Ratsimor, O., Chakraborty, D., Joshi, A., Finin, T.: Allia: Alliance-based service discovery for ad-hoc environments. In: Proceedings of the 2nd international Workshop on Mobile Commerce (WMC 2002), Atlanta, Georgia, USA (2002)Google Scholar
  19. 19.
    University of Southampton and QinetiQ: Trust Issues in Pervasive Environments (2003)Google Scholar
  20. 20.
    Zimmermann, P.R.: The official PGP User’s Guide. MIT Press, Cambridge (1995)Google Scholar
  21. 21.
    Marsh, S.: Formalizing Trust as a Computational Concept. Department of Computer Science. University of Sterling (1994)Google Scholar
  22. 22.
    Josang, A.: Prospectives of modeling trust in information security. In: Proceedings of the 2nd Australasian Conference on Information Security and Privacy, Sydney, Australia (1997)Google Scholar
  23. 23.
    Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the 33th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, pp. 1769–1777 (2000)Google Scholar
  24. 24.
    Blaze, M., Feigenbaum, J., Keromytis, A.D.: Keynote: Trust management for public key infrastructures. In: Proceedings of the 6th International Workshop on Security Protocols, Cambridge, UK (1998)Google Scholar
  25. 25.
    Sun Microsystems: Poblano: A Distributed Trust Model for Peer-to-Peer Networks (2000)Google Scholar
  26. 26.
    Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 4 (2000)Google Scholar
  27. 27.
    Hauser, C.H., Bakken, D.E., Bose, A.: A failure to communicate: Next-generation communication requirements, technologies, and architecture for the electric power grid. IEEE Power and Energy 3, 47–55 (2005)CrossRefGoogle Scholar
  28. 28.
    Tomsovic, K., Bakken, D.E., Venkatasubramanian, M., Bose, A.: Designing the next generation of real-time control, communication and computations for large power systems. Proceedings of the IEEE 93, 965–979 (2005); (Special Issue on Energy Infrastructure Systems)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Ovidiu V. Drugan
    • 1
  • Ioanna Dionysiou
    • 2
  • David E. Bakken
    • 1
    • 2
  • Thomas P. Plagemann
    • 1
  • Carl H. Hauser
    • 2
  • Deborah A. Frincke
    • 3
  1. 1.Department of InformaticsUniversity of OsloNorway
  2. 2.School of Electrical Engineering and Computer ScienceWashington State UniversityPullmanUSA
  3. 3.CyberSecurity GroupPacific Northwest National LaboratoryRichlandUSA

Personalised recommendations