On the importance of composability of ad hoc mobile middleware and trust management

Ovidiu V. Drugan, Ioanna Dionysiou, David E. Bakken, Thomas P. Plagemann, Carl H. Hauser, Deborah A. Frincke

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Distributed computing is widely expected to become ubiquitous over the next decade. Distributed services such as those provided by Service Oriented Architectures which will support this ubiquity must meet many requirements at both runtime and over their lifecycle. Composability is one key requirement for such services. In this paper we provide refined definitions of composability as it applies to such distributed services, encompassing both hardware and software. We then analyze these composability issues as they apply to two middleware frameworks which support critical infrastructures. The first examines composability issues for resource management infrastructure for a framework that provides middleware services for ad hoc mobile networks designed to support emergency rescue coordination. The second investigates composability issues involved with trust management for status dissemination for the electric power grid.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages149-163
Number of pages15
Volume3694 LNCS
DOIs
Publication statusPublished - 2005
Event2nd International Service Availability Symposium, ISAS 2005 - Berlin, Germany
Duration: 25 Apr 200526 Apr 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3694 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd International Service Availability Symposium, ISAS 2005
Country/TerritoryGermany
CityBerlin
Period25/04/0526/04/05

Fingerprint

Dive into the research topics of 'On the importance of composability of ad hoc mobile middleware and trust management'. Together they form a unique fingerprint.

Cite this