A Scheme for Component Based Service Deployment

نویسندگان

  • Steve Rudkin
  • Alan Smith
چکیده

A dynamic and open service market should be characterised by the frequent appearance of new and diverse services. But in the internet environment, where a significant proportion of the functionality of new services is supported by Customer Premises Equipment (CPE), deployment can be an issue. How can such a diverse range of new services be easily deployed particularly in a heterogeneous environment, like the internet, where different users have different terminal capabilities, and access bandwidths. This paper describes how the delivery, to the CPE device, of a recipe for dynamically building an application on the CPE device may be used to simplify the deployment of new services. In particular it shows how IBM’s Bean Mark Up Language, an XMLbased scripting language for describing a configuration of JavaBeans, can be used.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

Optimal Strategies of Increasing Business Alignment, in Social Security Organization, with Quality Function Deployment (QFD) Approach

Considering the importance of the concept of strategic alignment of information technology (IT) in today economic organizations, this study attempted to extract the organization's IT strategies in order to increase the degree of strategic alignment and consequently the optimal strategies in the field of marketing and service delivery for social security organization. Using QFD technique and hie...

متن کامل

A Quality Function Deployment Based Approach in Service Quality Analysis to Improve Customer Satisfaction

In metropolitan development management, quality of public services is influential in every public sector to satisfaction of citizens on quality of services. Nowadays, satisfaction are with such important matters that should be considered in the planning, implementation, management and maintenance of many public services such as subway, transportation, traffics, parks, markets and so on. Th...

متن کامل

PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks

Sensor networks are characterized by strict resource limitations and large scalability. Many sensor network applications require secure communication, a crucial component, especially in harsh environments. Symmetric key cryptography is very attractive in sensor networks due to its efficiency, but establishing a shared key for communicating parties is very challenging. The low computational capa...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000