A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures
Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine...
Gespeichert in:
Veröffentlicht in: | IEEE distributed systems online 2004-09, Vol.5 (9), p.1-1 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1 |
---|---|
container_issue | 9 |
container_start_page | 1 |
container_title | IEEE distributed systems online |
container_volume | 5 |
creator | Hill, R. Al-Muhtadi, J. Campbell, R. Kapadia, A. Naldurg, P. Ranganathan, A. |
description | Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine networks, processors, and devices with mechanisms, protocols, and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems that are isolated from the public Internet and are context insensitive. This leads to multiple, incompatible subsystems incapable of interoperating, thus making operations, management, and trust difficult. The Heterogeneous Survivable Trusted Information-Assurance Architecture addresses the problem of securing critical information services in large-scale ubiquitous computing environments. Hestia is a programmable middleware solution implemented as a network of middleboxes. These middleboxes form protective layers that isolate CCI services and mediate authorized access to Hestia's services. They also provide a programmable, distributed, object-oriented framework that enables the integration of security, privacy, and reliability mechanisms in service-access interfaces and implementations. |
doi_str_mv | 10.1109/MDSO.2004.21 |
format | Article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_miscellaneous_28805217</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1355901</ieee_id><sourcerecordid>901650658</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-750dd30e01c055b18b128cc6745826fe82b5be7b0869b098a24af850ef48bdcc3</originalsourceid><addsrcrecordid>eNp90c9LwzAUB_AiCv68efNSPKgHO1_SpHk9jvkTHEPmzqFJX7WyrVvSIv73pk4QPOyUl_BJyHvfKDplMGAM8pvx7XQy4ABiwNlOdMCkxIRlmO72tWCJyDnfjw69_wDgSqX8IHoZxuO6LOf0WTiKh86-1y3ZtgubqnHxlGzn6uVbPDP1uqvbpvPxqFmsurY_HH0ZcvHTsnKFb133c80fR3tVMfd08rseRbP7u9fRY_I8eXgaDZ8Ty_O0TZSEskyBgFmQ0jA0jKO1mRISeVYRciMNKQOY5QZyLLgoKpRAlUBTWpseRZebd1euWXfkW72ovaX5vFhS-KbOgWUSMolBXmyVHBEkZyrAq62QKYUQxit4oOf_6EfTuWVoWCOmQkmBWUDXG2Rd472jSq9cvSjcl2ag-8R0n5juE9OcBX624TUR_dFUytBL-g21fpCz</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>883475486</pqid></control><display><type>article</type><title>A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Hill, R. ; Al-Muhtadi, J. ; Campbell, R. ; Kapadia, A. ; Naldurg, P. ; Ranganathan, A.</creator><creatorcontrib>Hill, R. ; Al-Muhtadi, J. ; Campbell, R. ; Kapadia, A. ; Naldurg, P. ; Ranganathan, A.</creatorcontrib><description>Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine networks, processors, and devices with mechanisms, protocols, and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems that are isolated from the public Internet and are context insensitive. This leads to multiple, incompatible subsystems incapable of interoperating, thus making operations, management, and trust difficult. The Heterogeneous Survivable Trusted Information-Assurance Architecture addresses the problem of securing critical information services in large-scale ubiquitous computing environments. Hestia is a programmable middleware solution implemented as a network of middleboxes. These middleboxes form protective layers that isolate CCI services and mediate authorized access to Hestia's services. They also provide a programmable, distributed, object-oriented framework that enables the integration of security, privacy, and reliability mechanisms in service-access interfaces and implementations.</description><identifier>ISSN: 1541-4922</identifier><identifier>EISSN: 1558-1683</identifier><identifier>DOI: 10.1109/MDSO.2004.21</identifier><language>eng</language><publisher>Los Alamitos: IEEE</publisher><subject>Architecture ; Computation ; Computer architecture ; critical cyber infrastructure ; Devices ; Fault tolerance ; Hestia ; Infrastructure ; Internet ; IP networks ; Large-scale systems ; Middleboxes ; Middleware ; Networks ; Protocols ; Radiofrequency interference ; security ; Smart buildings ; Technological change ; Ubiquitous computing</subject><ispartof>IEEE distributed systems online, 2004-09, Vol.5 (9), p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2004</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-750dd30e01c055b18b128cc6745826fe82b5be7b0869b098a24af850ef48bdcc3</citedby><cites>FETCH-LOGICAL-c293t-750dd30e01c055b18b128cc6745826fe82b5be7b0869b098a24af850ef48bdcc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Hill, R.</creatorcontrib><creatorcontrib>Al-Muhtadi, J.</creatorcontrib><creatorcontrib>Campbell, R.</creatorcontrib><creatorcontrib>Kapadia, A.</creatorcontrib><creatorcontrib>Naldurg, P.</creatorcontrib><creatorcontrib>Ranganathan, A.</creatorcontrib><title>A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures</title><title>IEEE distributed systems online</title><addtitle>DSO</addtitle><description>Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine networks, processors, and devices with mechanisms, protocols, and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems that are isolated from the public Internet and are context insensitive. This leads to multiple, incompatible subsystems incapable of interoperating, thus making operations, management, and trust difficult. The Heterogeneous Survivable Trusted Information-Assurance Architecture addresses the problem of securing critical information services in large-scale ubiquitous computing environments. Hestia is a programmable middleware solution implemented as a network of middleboxes. These middleboxes form protective layers that isolate CCI services and mediate authorized access to Hestia's services. They also provide a programmable, distributed, object-oriented framework that enables the integration of security, privacy, and reliability mechanisms in service-access interfaces and implementations.</description><subject>Architecture</subject><subject>Computation</subject><subject>Computer architecture</subject><subject>critical cyber infrastructure</subject><subject>Devices</subject><subject>Fault tolerance</subject><subject>Hestia</subject><subject>Infrastructure</subject><subject>Internet</subject><subject>IP networks</subject><subject>Large-scale systems</subject><subject>Middleboxes</subject><subject>Middleware</subject><subject>Networks</subject><subject>Protocols</subject><subject>Radiofrequency interference</subject><subject>security</subject><subject>Smart buildings</subject><subject>Technological change</subject><subject>Ubiquitous computing</subject><issn>1541-4922</issn><issn>1558-1683</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNp90c9LwzAUB_AiCv68efNSPKgHO1_SpHk9jvkTHEPmzqFJX7WyrVvSIv73pk4QPOyUl_BJyHvfKDplMGAM8pvx7XQy4ABiwNlOdMCkxIRlmO72tWCJyDnfjw69_wDgSqX8IHoZxuO6LOf0WTiKh86-1y3ZtgubqnHxlGzn6uVbPDP1uqvbpvPxqFmsurY_HH0ZcvHTsnKFb133c80fR3tVMfd08rseRbP7u9fRY_I8eXgaDZ8Ty_O0TZSEskyBgFmQ0jA0jKO1mRISeVYRciMNKQOY5QZyLLgoKpRAlUBTWpseRZebd1euWXfkW72ovaX5vFhS-KbOgWUSMolBXmyVHBEkZyrAq62QKYUQxit4oOf_6EfTuWVoWCOmQkmBWUDXG2Rd472jSq9cvSjcl2ag-8R0n5juE9OcBX624TUR_dFUytBL-g21fpCz</recordid><startdate>20040901</startdate><enddate>20040901</enddate><creator>Hill, R.</creator><creator>Al-Muhtadi, J.</creator><creator>Campbell, R.</creator><creator>Kapadia, A.</creator><creator>Naldurg, P.</creator><creator>Ranganathan, A.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20040901</creationdate><title>A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures</title><author>Hill, R. ; Al-Muhtadi, J. ; Campbell, R. ; Kapadia, A. ; Naldurg, P. ; Ranganathan, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-750dd30e01c055b18b128cc6745826fe82b5be7b0869b098a24af850ef48bdcc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Architecture</topic><topic>Computation</topic><topic>Computer architecture</topic><topic>critical cyber infrastructure</topic><topic>Devices</topic><topic>Fault tolerance</topic><topic>Hestia</topic><topic>Infrastructure</topic><topic>Internet</topic><topic>IP networks</topic><topic>Large-scale systems</topic><topic>Middleboxes</topic><topic>Middleware</topic><topic>Networks</topic><topic>Protocols</topic><topic>Radiofrequency interference</topic><topic>security</topic><topic>Smart buildings</topic><topic>Technological change</topic><topic>Ubiquitous computing</topic><toplevel>online_resources</toplevel><creatorcontrib>Hill, R.</creatorcontrib><creatorcontrib>Al-Muhtadi, J.</creatorcontrib><creatorcontrib>Campbell, R.</creatorcontrib><creatorcontrib>Kapadia, A.</creatorcontrib><creatorcontrib>Naldurg, P.</creatorcontrib><creatorcontrib>Ranganathan, A.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE distributed systems online</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hill, R.</au><au>Al-Muhtadi, J.</au><au>Campbell, R.</au><au>Kapadia, A.</au><au>Naldurg, P.</au><au>Ranganathan, A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures</atitle><jtitle>IEEE distributed systems online</jtitle><stitle>DSO</stitle><date>2004-09-01</date><risdate>2004</risdate><volume>5</volume><issue>9</issue><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1541-4922</issn><eissn>1558-1683</eissn><abstract>Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine networks, processors, and devices with mechanisms, protocols, and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems that are isolated from the public Internet and are context insensitive. This leads to multiple, incompatible subsystems incapable of interoperating, thus making operations, management, and trust difficult. The Heterogeneous Survivable Trusted Information-Assurance Architecture addresses the problem of securing critical information services in large-scale ubiquitous computing environments. Hestia is a programmable middleware solution implemented as a network of middleboxes. These middleboxes form protective layers that isolate CCI services and mediate authorized access to Hestia's services. They also provide a programmable, distributed, object-oriented framework that enables the integration of security, privacy, and reliability mechanisms in service-access interfaces and implementations.</abstract><cop>Los Alamitos</cop><pub>IEEE</pub><doi>10.1109/MDSO.2004.21</doi><tpages>1</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1541-4922 |
ispartof | IEEE distributed systems online, 2004-09, Vol.5 (9), p.1-1 |
issn | 1541-4922 1558-1683 |
language | eng |
recordid | cdi_proquest_miscellaneous_28805217 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Architecture Computation Computer architecture critical cyber infrastructure Devices Fault tolerance Hestia Infrastructure Internet IP networks Large-scale systems Middleboxes Middleware Networks Protocols Radiofrequency interference security Smart buildings Technological change Ubiquitous computing |
title | A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T18%3A10%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Middleware%20Architecture%20for%20Securing%20Ubiquitous%20Computing%20Cyber%20Infrastructures&rft.jtitle=IEEE%20distributed%20systems%20online&rft.au=Hill,%20R.&rft.date=2004-09-01&rft.volume=5&rft.issue=9&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1541-4922&rft.eissn=1558-1683&rft_id=info:doi/10.1109/MDSO.2004.21&rft_dat=%3Cproquest_ieee_%3E901650658%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=883475486&rft_id=info:pmid/&rft_ieee_id=1355901&rfr_iscdi=true |