9,561 research outputs found
A Survey on Service Composition Middleware in Pervasive Environments
The development of pervasive computing has put the light on a challenging problem: how to dynamically compose services in heterogeneous and highly changing environments? We propose a survey that defines the service composition as a sequence of four steps: the translation, the generation, the evaluation, and finally the execution. With this powerful and simple model we describe the major service composition middleware. Then, a classification of these service composition middleware according to pervasive requirements - interoperability, discoverability, adaptability, context awareness, QoS management, security, spontaneous management, and autonomous management - is given. The classification highlights what has been done and what remains to do to develop the service composition in pervasive environments
Middleware Technologies for Cloud of Things - a survey
The next wave of communication and applications rely on the new services
provided by Internet of Things which is becoming an important aspect in human
and machines future. The IoT services are a key solution for providing smart
environments in homes, buildings and cities. In the era of a massive number of
connected things and objects with a high grow rate, several challenges have
been raised such as management, aggregation and storage for big produced data.
In order to tackle some of these issues, cloud computing emerged to IoT as
Cloud of Things (CoT) which provides virtually unlimited cloud services to
enhance the large scale IoT platforms. There are several factors to be
considered in design and implementation of a CoT platform. One of the most
important and challenging problems is the heterogeneity of different objects.
This problem can be addressed by deploying suitable "Middleware". Middleware
sits between things and applications that make a reliable platform for
communication among things with different interfaces, operating systems, and
architectures. The main aim of this paper is to study the middleware
technologies for CoT. Toward this end, we first present the main features and
characteristics of middlewares. Next we study different architecture styles and
service domains. Then we presents several middlewares that are suitable for CoT
based platforms and lastly a list of current challenges and issues in design of
CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268,
Digital Communications and Networks, Elsevier (2017
Middleware Technologies for Cloud of Things - a survey
The next wave of communication and applications rely on the new services
provided by Internet of Things which is becoming an important aspect in human
and machines future. The IoT services are a key solution for providing smart
environments in homes, buildings and cities. In the era of a massive number of
connected things and objects with a high grow rate, several challenges have
been raised such as management, aggregation and storage for big produced data.
In order to tackle some of these issues, cloud computing emerged to IoT as
Cloud of Things (CoT) which provides virtually unlimited cloud services to
enhance the large scale IoT platforms. There are several factors to be
considered in design and implementation of a CoT platform. One of the most
important and challenging problems is the heterogeneity of different objects.
This problem can be addressed by deploying suitable "Middleware". Middleware
sits between things and applications that make a reliable platform for
communication among things with different interfaces, operating systems, and
architectures. The main aim of this paper is to study the middleware
technologies for CoT. Toward this end, we first present the main features and
characteristics of middlewares. Next we study different architecture styles and
service domains. Then we presents several middlewares that are suitable for CoT
based platforms and lastly a list of current challenges and issues in design of
CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268,
Digital Communications and Networks, Elsevier (2017
Design and implementation of extensible middleware for non-repudiable interactions
PhD ThesisNon-repudiation is an aspect of security that is concerned with the creation of irrefutable audits of
an interaction. Ensuring the audit is irrefutable and verifiable by a third party is not a trivial task.
A lot of supporting infrastructure is required which adds large expense to the interaction. This
infrastructure comprises, (i) a non-repudiation aware run-time environment, (ii) several purpose
built trusted services and (iii) an appropriate non-repudiation protocol. This thesis presents design
and implementation of such an infrastructure. The runtime environment makes use of several trusted
services to achieve external verification of the audit trail. Non-repudiation is achieved by executing
fair non-repudiation protocols. The Fairness property of the non-repudiation protocol allows a
participant to protect their own interests by preventing any party from gaining an advantage by
misbehaviour. The infrastructure has two novel aspects; extensibility and support for automated
implementation of protocols.
Extensibility is achieved by implementing the infrastructure in middleware and by presenting a
large variety of non-repudiable business interaction patterns to the application (a non-repudiable
interaction pattern is a higher level protocol composed from one or more non-repudiation protocols).
The middleware is highly configurable allowing new non-repudiation protocols and interaction
patterns to be easily added, without disrupting the application.
This thesis presents a rigorous mechanism for automated implementation of non-repudiation
protocols. This ensures that the protocol being executed is that which was intended and verified
by the protocol designer. A family of non-repudiation protocols are taken and inspected. This
inspection allows a set of generic finite state machines to be produced. These finite state machines
can be used to maintain protocol state and manage the sending and receiving of appropriate protocol
messages.
A concrete implementation of the run-time environment and the protocol generation techniques is
presented. This implementation is based on industry supported Web service standards and services.EPSRC, The Hewlett Packard Arjuna La
- …