Advertisement

Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments

  • Anupam Joshi
  • Timothy Finin
  • Yelena Yesha
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2512)

Abstract

Increasing computational capabilities and decreasing costs of commonly used devices, and the concomitant development of short range, ad-hoc networking technologies, will help realize the pervasive computing paradigm. In this paper, we present the use of semantically rich descriptions for devices to discover, and cooperate with, others in their vicinity. In particular, we describe our ongoing projects that have used DAML for service discovery, service composition, data management, and trust based security in pervasive computing environments.

Keywords

Personal Digital Assistant Resource Description Framework Service Composition Service Discovery Trust Management 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    S. Avancha, A. Joshi, and T. Finin. Enhancing the Bluetooth Service Discovery Protocol. Technical report, University of Maryland Baltimore County, August 2001. TR-CS-01-08.Google Scholar
  2. 2.
    H. Bharadvaj, A. Joshi, and S. Auephanwiriyakyl. An Active Transcoding Proxy to Support Mobile Web Access. In Proc. of the IEEE Symposium on Reliable Distributed Systems, October 1998.Google Scholar
  3. 3.
    M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The Role of Trust Management in Distributed Systems, volume 1603 of LNCS, chapter Secure Internet Programming, pages 185–210. Springer, Berlin, 1999.Google Scholar
  4. 4.
    M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. IEEE Proceedings of the 17th Symposium, 1996.Google Scholar
  5. 5.
    E.A. Brewer, R.H. Katz, Y. Chawathe, A. Fox, S.D. Gribble, T. Hodes, G. Nguyen, T. Henderson, E. Amir, H. Balakrishnan, A. Fox, V. Padmanabhan, and S. Seshan. A network architecture for heterogeneous mobile computing. IEEE Personal Communications Magazine, 5(5):8–24, 1998.CrossRefGoogle Scholar
  6. 6.
    D. Brickley and R. Guha. Resource Description Framework (RDF) Schema Specification 1.0 — W3C Recommendation. http://www.w3.org/TR/2000/CR-rdfschema-20000327, 2000.
  7. 7.
    F. Casati, S. Ilnicki, L. Jin, V. Krishnamoorthy, and M. Shan. Adaptive and Dynamic Service Composition in eFlow. Technical Report, HPL-200039, Software Technology Laboratory, Palo Alto, CA, March 2000.Google Scholar
  8. 8.
    The DAML Services Coalition. DAML-S: Semantic markup for web services. http://www.daml.org/services/.
  9. 9.
    J. Hendler. DARPA Agent Markup Language. http://www.daml.org, 2000.
  10. 10.
    A. Joshi. On proxy agents, mobility and web access. ACM/Baltzer Journal of Mobile Networks and Applications, 2000.Google Scholar
  11. 11.
    A. Joshi, S. Weerawarana, and E. N. Houstis. On Disconnected Browsing of Distributed Information. In Proc. of the Seventh IEEE Intl. Workshop on Research Issues in Data Engineering, pages 101–108. IEEE, April 1997.Google Scholar
  12. 12.
    L. Kagal, T. Finin, and Y. Peng. A framework for distributed trust management. In Second Workshop on Norms and Institutions in MAS, Autonomous Agents, 2001, 2001.Google Scholar
  13. 13.
    L. Kagal, J. Undercoffer, T. Finin, and A. Joshi. Vigil: Enforcing Security for Pervasive Enviroments. In Under review, 2001.Google Scholar
  14. 14.
    R. H. Katz, E. A. Brewer, E. Amir, H. Balakrishnan, A. Fox, S. Gribble, T. Hodes, D. Jiang, G. T. Nguyen, V. Padmanabhan, and M. Stemm. The bay area research wireless access network (barwan). In Proceedings Spring COMPCON Conference, 1996.Google Scholar
  15. 15.
    O. Lassila and R. Swick. Resource Description Framework. http://www.w3.org/TR/1999/REC/rdf-syntax-19990222, 1999.
  16. 16.
    M. Liljeberg, M. Kojo, and K. Raatikainen. Enhanced services for world-wide web in mobile wan environment. http://www.cs.Helsinki.FI/research/mowgli/mowgli-papers.html, 1996.
  17. 17.
    E. C. Lupu and M. Sloman. Towards a Role Based Framework for Distributed Systems Management. Journal of Networks and Systemss Management, Plenum Press, 1996.Google Scholar
  18. 18.
    B. D. Noble, M. Price, and M. Sathyanarayanan. A programming interface for application-aware adaptation in mobile computing. In Proceedings of the Second USENIX Symposium on Mobile & Location-Independent Computing, Ann Arbor, MI, April 1995.Google Scholar
  19. 19.
    B. D. Noble, M. Satyanarayanan, D. Narayanan, J. E. Tilton, J. Flinn, and K. R.Walker. Agile application-aware adaptation for mobility. In Proceedings of the 16th ACM Symposium on Operating System Principles, 1996.Google Scholar
  20. 20.
    Bluetooth White Paper. World Wide Web.Google Scholar
  21. 21.
    F. Perich, S. Avancha, A. Joshi, Y Yesha, and K. Joshi. Query routing and processing in mobile ad-hoc environments. Technical Report TR-CS-01-18, CSEE, UMBC, November 2001. short version accepted for publication at DEXA 2002.Google Scholar
  22. 22.
    A. Rao and M. Georgef. Modelling rational agents within a bdi architecture. In Proc. of the Int. Conf. on Knowledge Representation and Reasoning, pages 473–484, San Mateo, CA, 1991. Morgan Kaufmann.Google Scholar
  23. 23.
    R. S. Sandhu. Role-Based Access Control. In M. Zerkowitz, editor, Advances in Computers, volume 48. Academic Press, 1998.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Anupam Joshi
    • 1
  • Timothy Finin
    • 1
  • Yelena Yesha
    • 1
  1. 1.Department of Computer Science and Electrical EngineeringUniversity of Maryland Baltimore CountyBaltimore

Personalised recommendations