A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures

Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE distributed systems online 2004-09, Vol.5 (9), p.1-1
Hauptverfasser: Hill, R., Al-Muhtadi, J., Campbell, R., Kapadia, A., Naldurg, P., Ranganathan, A.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue 9
container_start_page 1
container_title IEEE distributed systems online
container_volume 5
creator Hill, R.
Al-Muhtadi, J.
Campbell, R.
Kapadia, A.
Naldurg, P.
Ranganathan, A.
description Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine networks, processors, and devices with mechanisms, protocols, and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems that are isolated from the public Internet and are context insensitive. This leads to multiple, incompatible subsystems incapable of interoperating, thus making operations, management, and trust difficult. The Heterogeneous Survivable Trusted Information-Assurance Architecture addresses the problem of securing critical information services in large-scale ubiquitous computing environments. Hestia is a programmable middleware solution implemented as a network of middleboxes. These middleboxes form protective layers that isolate CCI services and mediate authorized access to Hestia's services. They also provide a programmable, distributed, object-oriented framework that enables the integration of security, privacy, and reliability mechanisms in service-access interfaces and implementations.
doi_str_mv 10.1109/MDSO.2004.21
format Article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_miscellaneous_28805217</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1355901</ieee_id><sourcerecordid>901650658</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-750dd30e01c055b18b128cc6745826fe82b5be7b0869b098a24af850ef48bdcc3</originalsourceid><addsrcrecordid>eNp90c9LwzAUB_AiCv68efNSPKgHO1_SpHk9jvkTHEPmzqFJX7WyrVvSIv73pk4QPOyUl_BJyHvfKDplMGAM8pvx7XQy4ABiwNlOdMCkxIRlmO72tWCJyDnfjw69_wDgSqX8IHoZxuO6LOf0WTiKh86-1y3ZtgubqnHxlGzn6uVbPDP1uqvbpvPxqFmsurY_HH0ZcvHTsnKFb133c80fR3tVMfd08rseRbP7u9fRY_I8eXgaDZ8Ty_O0TZSEskyBgFmQ0jA0jKO1mRISeVYRciMNKQOY5QZyLLgoKpRAlUBTWpseRZebd1euWXfkW72ovaX5vFhS-KbOgWUSMolBXmyVHBEkZyrAq62QKYUQxit4oOf_6EfTuWVoWCOmQkmBWUDXG2Rd472jSq9cvSjcl2ag-8R0n5juE9OcBX624TUR_dFUytBL-g21fpCz</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>883475486</pqid></control><display><type>article</type><title>A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Hill, R. ; Al-Muhtadi, J. ; Campbell, R. ; Kapadia, A. ; Naldurg, P. ; Ranganathan, A.</creator><creatorcontrib>Hill, R. ; Al-Muhtadi, J. ; Campbell, R. ; Kapadia, A. ; Naldurg, P. ; Ranganathan, A.</creatorcontrib><description>Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine networks, processors, and devices with mechanisms, protocols, and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems that are isolated from the public Internet and are context insensitive. This leads to multiple, incompatible subsystems incapable of interoperating, thus making operations, management, and trust difficult. The Heterogeneous Survivable Trusted Information-Assurance Architecture addresses the problem of securing critical information services in large-scale ubiquitous computing environments. Hestia is a programmable middleware solution implemented as a network of middleboxes. These middleboxes form protective layers that isolate CCI services and mediate authorized access to Hestia's services. They also provide a programmable, distributed, object-oriented framework that enables the integration of security, privacy, and reliability mechanisms in service-access interfaces and implementations.</description><identifier>ISSN: 1541-4922</identifier><identifier>EISSN: 1558-1683</identifier><identifier>DOI: 10.1109/MDSO.2004.21</identifier><language>eng</language><publisher>Los Alamitos: IEEE</publisher><subject>Architecture ; Computation ; Computer architecture ; critical cyber infrastructure ; Devices ; Fault tolerance ; Hestia ; Infrastructure ; Internet ; IP networks ; Large-scale systems ; Middleboxes ; Middleware ; Networks ; Protocols ; Radiofrequency interference ; security ; Smart buildings ; Technological change ; Ubiquitous computing</subject><ispartof>IEEE distributed systems online, 2004-09, Vol.5 (9), p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2004</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-750dd30e01c055b18b128cc6745826fe82b5be7b0869b098a24af850ef48bdcc3</citedby><cites>FETCH-LOGICAL-c293t-750dd30e01c055b18b128cc6745826fe82b5be7b0869b098a24af850ef48bdcc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Hill, R.</creatorcontrib><creatorcontrib>Al-Muhtadi, J.</creatorcontrib><creatorcontrib>Campbell, R.</creatorcontrib><creatorcontrib>Kapadia, A.</creatorcontrib><creatorcontrib>Naldurg, P.</creatorcontrib><creatorcontrib>Ranganathan, A.</creatorcontrib><title>A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures</title><title>IEEE distributed systems online</title><addtitle>DSO</addtitle><description>Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine networks, processors, and devices with mechanisms, protocols, and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems that are isolated from the public Internet and are context insensitive. This leads to multiple, incompatible subsystems incapable of interoperating, thus making operations, management, and trust difficult. The Heterogeneous Survivable Trusted Information-Assurance Architecture addresses the problem of securing critical information services in large-scale ubiquitous computing environments. Hestia is a programmable middleware solution implemented as a network of middleboxes. These middleboxes form protective layers that isolate CCI services and mediate authorized access to Hestia's services. They also provide a programmable, distributed, object-oriented framework that enables the integration of security, privacy, and reliability mechanisms in service-access interfaces and implementations.</description><subject>Architecture</subject><subject>Computation</subject><subject>Computer architecture</subject><subject>critical cyber infrastructure</subject><subject>Devices</subject><subject>Fault tolerance</subject><subject>Hestia</subject><subject>Infrastructure</subject><subject>Internet</subject><subject>IP networks</subject><subject>Large-scale systems</subject><subject>Middleboxes</subject><subject>Middleware</subject><subject>Networks</subject><subject>Protocols</subject><subject>Radiofrequency interference</subject><subject>security</subject><subject>Smart buildings</subject><subject>Technological change</subject><subject>Ubiquitous computing</subject><issn>1541-4922</issn><issn>1558-1683</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNp90c9LwzAUB_AiCv68efNSPKgHO1_SpHk9jvkTHEPmzqFJX7WyrVvSIv73pk4QPOyUl_BJyHvfKDplMGAM8pvx7XQy4ABiwNlOdMCkxIRlmO72tWCJyDnfjw69_wDgSqX8IHoZxuO6LOf0WTiKh86-1y3ZtgubqnHxlGzn6uVbPDP1uqvbpvPxqFmsurY_HH0ZcvHTsnKFb133c80fR3tVMfd08rseRbP7u9fRY_I8eXgaDZ8Ty_O0TZSEskyBgFmQ0jA0jKO1mRISeVYRciMNKQOY5QZyLLgoKpRAlUBTWpseRZebd1euWXfkW72ovaX5vFhS-KbOgWUSMolBXmyVHBEkZyrAq62QKYUQxit4oOf_6EfTuWVoWCOmQkmBWUDXG2Rd472jSq9cvSjcl2ag-8R0n5juE9OcBX624TUR_dFUytBL-g21fpCz</recordid><startdate>20040901</startdate><enddate>20040901</enddate><creator>Hill, R.</creator><creator>Al-Muhtadi, J.</creator><creator>Campbell, R.</creator><creator>Kapadia, A.</creator><creator>Naldurg, P.</creator><creator>Ranganathan, A.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20040901</creationdate><title>A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures</title><author>Hill, R. ; Al-Muhtadi, J. ; Campbell, R. ; Kapadia, A. ; Naldurg, P. ; Ranganathan, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-750dd30e01c055b18b128cc6745826fe82b5be7b0869b098a24af850ef48bdcc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Architecture</topic><topic>Computation</topic><topic>Computer architecture</topic><topic>critical cyber infrastructure</topic><topic>Devices</topic><topic>Fault tolerance</topic><topic>Hestia</topic><topic>Infrastructure</topic><topic>Internet</topic><topic>IP networks</topic><topic>Large-scale systems</topic><topic>Middleboxes</topic><topic>Middleware</topic><topic>Networks</topic><topic>Protocols</topic><topic>Radiofrequency interference</topic><topic>security</topic><topic>Smart buildings</topic><topic>Technological change</topic><topic>Ubiquitous computing</topic><toplevel>online_resources</toplevel><creatorcontrib>Hill, R.</creatorcontrib><creatorcontrib>Al-Muhtadi, J.</creatorcontrib><creatorcontrib>Campbell, R.</creatorcontrib><creatorcontrib>Kapadia, A.</creatorcontrib><creatorcontrib>Naldurg, P.</creatorcontrib><creatorcontrib>Ranganathan, A.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE distributed systems online</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hill, R.</au><au>Al-Muhtadi, J.</au><au>Campbell, R.</au><au>Kapadia, A.</au><au>Naldurg, P.</au><au>Ranganathan, A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures</atitle><jtitle>IEEE distributed systems online</jtitle><stitle>DSO</stitle><date>2004-09-01</date><risdate>2004</risdate><volume>5</volume><issue>9</issue><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1541-4922</issn><eissn>1558-1683</eissn><abstract>Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine networks, processors, and devices with mechanisms, protocols, and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems that are isolated from the public Internet and are context insensitive. This leads to multiple, incompatible subsystems incapable of interoperating, thus making operations, management, and trust difficult. The Heterogeneous Survivable Trusted Information-Assurance Architecture addresses the problem of securing critical information services in large-scale ubiquitous computing environments. Hestia is a programmable middleware solution implemented as a network of middleboxes. These middleboxes form protective layers that isolate CCI services and mediate authorized access to Hestia's services. They also provide a programmable, distributed, object-oriented framework that enables the integration of security, privacy, and reliability mechanisms in service-access interfaces and implementations.</abstract><cop>Los Alamitos</cop><pub>IEEE</pub><doi>10.1109/MDSO.2004.21</doi><tpages>1</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1541-4922
ispartof IEEE distributed systems online, 2004-09, Vol.5 (9), p.1-1
issn 1541-4922
1558-1683
language eng
recordid cdi_proquest_miscellaneous_28805217
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Architecture
Computation
Computer architecture
critical cyber infrastructure
Devices
Fault tolerance
Hestia
Infrastructure
Internet
IP networks
Large-scale systems
Middleboxes
Middleware
Networks
Protocols
Radiofrequency interference
security
Smart buildings
Technological change
Ubiquitous computing
title A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T18%3A10%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Middleware%20Architecture%20for%20Securing%20Ubiquitous%20Computing%20Cyber%20Infrastructures&rft.jtitle=IEEE%20distributed%20systems%20online&rft.au=Hill,%20R.&rft.date=2004-09-01&rft.volume=5&rft.issue=9&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1541-4922&rft.eissn=1558-1683&rft_id=info:doi/10.1109/MDSO.2004.21&rft_dat=%3Cproquest_ieee_%3E901650658%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=883475486&rft_id=info:pmid/&rft_ieee_id=1355901&rfr_iscdi=true