Security-enabled code deployment for heterogeneous networks
نویسنده
چکیده
Future services on converged heterogeneous networks are expected to increase the demand for code distribution, on the fly installment and dynamic management. Component discovery, download, installation, revocation, and profiling are critical in supporting next generation enabling technologies and application evolvement. We present here the architecture of an active component manager and discuss on metadata that should be used to describe components and their capabilities. Furthermore we elaborate on XML digital signatures as an integral part of secure component distribution. Finally we investigate topologies for component distribution and how emerging technologies like peer-to-peer could be used in the context of active component manager. This paper is motivated by the vision of Google-like code discovery, and flexible management of it, within the future semantic web context.
منابع مشابه
A novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملAn efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملEnergy-Efficient Opaque IP over WDM Networks with Survivability and Security Constraints
Mixed deployment of sleep-enabled and non-sleep-enabled router cards is suggested at each node of an IP over WDM network along with survivability and security constraints. This is used to design a green network which is observed to reduce energy consumption (by up to 28% for an example network) compared to a network where the router cards are not sleep-enabled. OCIS codes: (060.4250) Networks; ...
متن کاملA Secure Code Deployment Scheme for Active Networks
Active Networking is an innovative technology which can open the network and make it more flexible. But, introducing active code within the network increases the network vulnerability from security point of view. The security is always considered as a separated component or an upper layer of the active network architecture. In this paper, we develop a global security architecture for a safe cod...
متن کاملSecurity and Privacy in Heterogeneous Wireless and Mobile Networks: Challenges and Solutions
The rapid advances in wireless communications and networking have given rise to a number of emerging heterogeneous wireless and mobile networks along with novel networking paradigms, including wireless sensor networks, mobile crowdsourcing, and mobile social networking. While offering promising solutions to a wide range of new applications, their widespread adoption and large-scale deployment a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computer Standards & Interfaces
دوره 27 شماره
صفحات -
تاریخ انتشار 2005