An Explorative Model for Federated Trading in Distributed Computing Environments

نویسنده

  • Ok-Ki Lee
چکیده

We propose a model for trading in very large-scale distributed computing environments which is based on the gradual evolution of a federated trading space through a process of continual exploration and evaluation, rather than on the imposition of a strictly managed hierarchy. In our model, each trader autonomously acquires local knowledge of the trading space, called trading knowledge, through a process of distributed resource discovery. Trading knowledge typically consists of trader links which reference other traders. Trader links also contain a measure of affinity: a strength of attraction based on a comparison of so called service and interest profiles, perhaps combined with a history of how useful and reliable other traders have proved to be. This notion of affinity helps a trader to decide how to resolve import requests which cannot be satisfied locally. It also helps a trader to decide which trader links to retain as it periodically and autonomously explores the trading environment. Instead of being concerned with the detailed management of individual trader links, human managers can then control the evolution of the trading space through a number of high level management policies. These include service and interest profiles, definitions of affinity and instructions on when and how exploration should occur. Our paper also describes a reference implementation of the model within the ANSAware distributed processing environment called the Explorative Trading Service (ETS).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trading services in open distributed environments

The current development of computing and telecommunication environments aims towards interoperability across separate platforms and organisations in a world-wide fashion. Interoperability means that software components can be exploited from arbitrary computers in such a way that the service semantics is preserved. The mechanisms supporting interoperability at the application level must mask het...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995