Conference Paper

Supporting Environment Configuration with Generic Role Assignment

DOI: 10.1109/IE.2011.17 Conference: 7th International Conference on Intelligent Environments, IE 2011, Nottingham, United Kingdom, July 25-28, 2011
Source: DBLP


Due to the fact that distant objects are often less relevant to an application than objects in the proximity, middleware systems for pervasive computing typically exploit locality to improve efficiency. To do this, they configure the environment by introducing logical boundaries that reduce the number of interacting devices. Yet, in cases where applications require the interaction with distant objects, the boundaries become an artificial barrier that must be overcome by supplemental mechanisms. In this paper, we show how this problem can be avoided by using role assignment as a generic mechanism for environment configuration. To do this, we first derive the requirements for configuring a pervasive computing environment. We discuss how these requirements can be met by means of role assignment. To evaluate the approach, we present a prototypical implementation which we use to quantify the resulting overheads. The results indicate that role assignment enables a more flexible definition of boundaries at a low cost.

Download full-text


Available from: Pedro José Marrón, Nov 20, 2014
  • [Show abstract] [Hide abstract]
    ABSTRACT: One of the key characteristics of pervasive computing applications is their ability to adapt to their environment. One possible approach to simplify the development of such adaptive applications is to use middleware to automate adaptation decisions. However, in many application scenarios, adaptation decisions can have critical security implications. Thus, when designing middleware to support adaptation it is necessary to take security constraints into account. In previous work, we presented generic role assignment as a middleware abstraction to support adaptation. In contrast to other approaches, role assignment enables adaptation within a single and across multiple smart environments in a flexible, application-overarching manner. In this paper, we extend the concept to support security constraints. Furthermore, we describe the necessary modifications to our existing role assignment system. Finally, we evaluate our approach showing resulting benefits and limitations. In comparison with existing approaches, the proposed approach is more flexible and does not introduce a single point of trust.
    No preview · Conference Paper · Jun 2012