skip to main content
10.1145/1376866.1376869acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article

A service-oriented virtual community overlay network for secure external service orchestration

Published:26 November 2007Publication History

ABSTRACT

The Service Oriented Architecture (SOA) is used extensively in ubiquitous computing environments. Using external service orchestration, services can be composed into applications. Since cooperation takes place between services that are scattered over the Internet and belong to different parties, there is a growing need to protect the ownership of service providers and keep the security of communication messages in service composition. This paper shows the details of a service-oriented virtual community overlay network designed for secure external service orchestration. It can also provide contracted QoS guarantees that will definitely affect the overall performance of ubiquitous applications. Further, it highlights the working principle of access control policies as well as a service behavior monitoring mechanism using an example scenario.

References

  1. SOA. http://www.service-architecture.com/index.html.Google ScholarGoogle Scholar
  2. Ethan Cerami. Web Services Essentials: Distributed Applications with XML-RPC, SOAP, UDDI & WSDL. First Edition February 2002. ISBN: 0-596-00224-6, 304 pages. Publisher: O'Reilly. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. UPnP Device Architecture. Version 1.0. http://www.upnp.org/Google ScholarGoogle Scholar
  4. Sun Microsystems. Jini technology architectural overview. White Paper. http://www.sun.com/jini/whitepapers/architecture.htmlGoogle ScholarGoogle Scholar
  5. Howard Rheingold. The Virtual Community. Http://www.rheingold.com/vc/book/Google ScholarGoogle Scholar
  6. Ultima Online. http://www.uo.com/Google ScholarGoogle Scholar
  7. Shudong Chen, Johan Lukkien, Igor Radovanovic. Service discovery, access and cooperation in virtual communities. I-Share Project Deliverable. http://www.win.tue.nl/san/amosa/download/ishare/D1.5.pdfGoogle ScholarGoogle Scholar
  8. SOAP Version 1.2. Published Specification. http://www.w3.org/TR/soap/Google ScholarGoogle Scholar
  9. Cohen, B. Incentives to Build Robustness in BitTorrent. Proceedings 1st Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, 2003. http://bittorrent.com/bittorrentecon.pdfGoogle ScholarGoogle Scholar
  10. Gnutella. http://gnutella.wego.com/Google ScholarGoogle Scholar
  11. B. Zhao, K. Kubiatowicz, and A. Joseph. Tapestry: An infrastructure for fault-resilient wide-area location and routing. Technical Report UCB//CSD-01-1141, University of California at Berkeley, April 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Orkut. http://www.orkut.com/Google ScholarGoogle Scholar
  13. I. G. Niemegeers and S. M. Heemstra de Root. Fednets: Context-Aware Ad-Hoc Network Federations. In Proc. Of Wireless Personal Communications (2005) 33: 305--318. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Czerwinski, B. Y. Zhao, T. Hodes, A. Joseph, R. Katz. An Architecture for Secure Service Discovery Service, Fifth International Conference on Mobile Computing and Networks (MobiCom'99), Seattle, WA, pp. 24--35, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Pearlman, V. Welch, I. Foster, C. Kesselman, S. Tuecke. A Community Authorization Service for Group Collaboration. Third International Workshop on Policies for Distributed Systems and Networks, Monterey, CA, USA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Housley, R., W. Ford, W. Polk and D. Solo. Internet X.509 Public Key Infrastructure: Certificate and CRL Profile. http://tools.ietf.org/html/rfc3280 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. AMOSA project website. http://www.win.tue.nl/san/amosaGoogle ScholarGoogle Scholar

Index Terms

  1. A service-oriented virtual community overlay network for secure external service orchestration

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      MPAC '07: Proceedings of the 5th international workshop on Middleware for pervasive and ad-hoc computing: held at the ACM/IFIP/USENIX 8th International Middleware Conference
      November 2007
      71 pages
      ISBN:9781595939302
      DOI:10.1145/1376866

      Copyright © 2007 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 November 2007

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader