Skip to main content

A Model for Flexible Service Use and Secure Resource Management

  • Conference paper
Advances in Grid Computing - EGC 2005 (EGC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3470))

Included in the following conference series:

Abstract

Grid computing is promissing as an infrastructure that allows users to use distributed computer resources by simple connecting a computer to the network without special operation; just like connecting to the electricity, water or gas grid. In this paper, regarding resources as services, we propose a new architecture for realizing an environment in which users can use services that are in various locations through their portable terminals. In this architecture, a service is managed by an agent, which has two resource management spaces named the Public Zone and the Private Zone. The Public Zone is a space for realizing flexible public service use. The Private Zone is a space for protecting private user information. Moreover, agents are organized in a group called the community and are managed independently in each community. Thus, we realize both of flexible service use while protecting private information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. distributed.net, http://distributed.net/

  2. Erickson, J.S.: Fair Use, DRM, and Trusted Computing. Communication of ACM 46(4), 34–39 (2003)

    Article  MathSciNet  Google Scholar 

  3. Iwao, T., Wada, Y., Okada, M., Amamiya, M.: A Framework for the Exchange and Installation of Protocols in a Multi-Agent System. In: Klusch, M., Zambonelli, F. (eds.) CIA 2001. LNCS (LNAI), vol. 2182, pp. 211–222. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Kagal, L., Finin, T., Joshi, A.: Trust-Based Security for Pervasive Computing Environments. IEEE Computer 34(12), 154–157 (2001)

    Google Scholar 

  5. SETI@home, http://setiathome.ssl.berkeley.edu/

  6. Zhong, G., et al.: The Design and Implementation of KODAMA System. IEICE Transactions INF.& SYST. E85-D(4), 637–646 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Takahashi, K., Amamiya, S., Amamiya, M. (2005). A Model for Flexible Service Use and Secure Resource Management. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds) Advances in Grid Computing - EGC 2005. EGC 2005. Lecture Notes in Computer Science, vol 3470. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11508380_117

Download citation

  • DOI: https://doi.org/10.1007/11508380_117

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26918-2

  • Online ISBN: 978-3-540-32036-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics