Third-Party Resource Usage for Pervasive Computing
نویسندگان
چکیده
We propose an integrated approach to resource management for end-to-end pervasive services, spanning over foundational models, abstract machines, runtime environments and programming languages. Our programme builds upon the extensive body of foundational work on ubiquitous (or global) computing and on existing research on programmable networks, complementing current activities in the EPSRC Programmable Networks initiative.
منابع مشابه
Access and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملFine Grained Resource Reservation and Management in Grid Economics
Researchers have been actively looking at utilising new models for network based services. For enterprises and third party service providers can enable their infrastructure based on utility computing and next generation Internet technology to create dynamic virtual organisations. Small fixed and mobile, pervasive and ubiquitous devices will also benefit from networked services and computation p...
متن کاملAbusing Public Third-Party Services for EDoS Attacks
Cloud computing has been widely adopted nowadays as it provides economical, elastic and scalable services to customers. The cloud resources are offered in an ondemand manner and the consumers are charged based on their resource usage, known as “pay-as-you-go”. Such a cloud utility scheme opens the door to Economic Denial of Sustainability (EDoS) attacks in which the cloud consumers would suffer...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملThe Edge of the Cloud
T wo of the most important technological developments of the last few years are the emergence of mobile and cloud computing. By shifting the hardware and staffing costs of managing the computational infrastructure to third parties—such as Google, Microsoft, or Amazon—cloud computing has made it possible for small organizations and individuals to deploy world-scale services while paying only the...
متن کامل