Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/646867.706699guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The SAHARA Model for Service Composition across Multiple Providers

Published: 26 August 2002 Publication History

Abstract

Services are capabilities that enable applications and are of crucial importance to pervasive computing in next-generation networks. Service Composition is the construction of complex services from primitive ones; thus enabling rapid and flexible creation of new services. The presence of multiple independent service providers poses new and significant challenges. Managing trust across providers and verifying the performance of the components in composition become essential issues. Adapting the composed service to network and user dynamics by choosing service providers and instances is yet another challenge. In SAHARA, we are developing a comprehensive architecture for the creation, placement, and management of services for composition across independent providers. In this paper, we present a layered reference model for composition based on a classification of different kinds of composition. We then discuss the different overarching mechanisms necessary for the successful deployment of such an architecture through a variety of case-studies involving composition.

References

[1]
Curley, F.: Mobile Virtual Network Operators (Part IV). In: Eurescom Summit, 3G Technologies and Applications. (2001).
[2]
Chen, Y., Lim, K., Overton, C., Katz, R.H.: On the Stability of Network Distance Estimation. In: ACM SIGMETRICS PAPA Workshop. (2002).
[3]
Raman, B., Katz, R.H., Joseph, A.D.: Universal Inbox: Providing Extensible Personal Mobility and Service Mobility in an Integrated Communication Network. In: WMCSA. (2000).
[4]
Raman, B., Katz, R.H.: Emulation-based Evaluation of an Architecture for Wide-Area Service Composition. In: SPECTS. (2002).
[5]
Labovitz, C., Ahuja, A., Abose, A., Jahanian, F.: An Experimental Study of Delayed Internet Routing Convergence. In: ACM SIGCOMM. (2000).
[6]
Mao, Z., Cranor, C., Douglis, F., Rabinovich, M., Spatscheck, O., Wang, J.: A Precise and Efficient Evaluation of the Proximity between Web Clients and their Local DNS Servers. In: USENIX. (2002).
[7]
Shih, J., Katz, R.H., Joseph, A.D.: Pricing Experiments for a Computer-Telephony-Service Usage Allocation. In: IEEE GLOBECOM. (2001).
[8]
Caesar, M., Balaraman, S., Ghosal, D.: A Comparative Study of Pricing Strategies for IP Telephony. In: IEEE GLOBECOM. (2000).
[9]
Caesar, M., Ghosal, D., Katz, R.H.: Resource Management in IP Telephony Networks. In: IWQOS. (2002).
[10]
Suzuki, T., Katz, R.H.: An Authorization Control Framework to Enable Service Composition Across Domains. In: ACM WWW (poster). (2002).
[11]
Huston, G.: Analyzing the Internet's BGP Routing Table. Cisco Internet Protocol Journal (2001).
[12]
Agarwal, S., Chuah, C., Katz, R.H.: An Overlay Policy Protocol to Augment BGP (2002) Work in progress.
[13]
Subramanian, L., Agarwal, S., Rexford, J., Katz, R.H.: Characterizing the Internet Hierarchy From Multiple Vantage Points. In: IEEE INFOCOM. (2002).
[14]
Chawathe, Y., Seshadri, M.: Broadcast Federation: An Application-layer Broadcast Internet-work. In: NOSSDAV. (2002).
[15]
Chen, Y., Katz, R.H., Kubiatowicz, J.: Dynamic Replica Placement for Scalable Content Delivery. In: IPTPS. (2002).
[16]
Chen, Y., Qiu, L., Chen, W., Nguyen, L., Katz, R.H.: On the Clustering of Web Content for Efficient Replication (2002) Submitted for publication.
[17]
Mohr, W., Konhauser, W.: Access Network Evolution Beyond Third Generation Mobile Communications. IEEE Communications Magazine (2000).
[18]
Pandya, R., Grillo, D., Lycksell, E., Mieybegue, P., Okinaka, H.: IMT-2000 Standards: Network Aspects. IEEE Personal Communications Magazine (1997).
[19]
Wang, H.J., Raman, B., Chuah, C.N., Biswas, R., Gummadi, R., Hohlt, B., Hong, X., Kiciman, E., Mao, Z., Shih, J., Subramanian, L., Zhao, B.Y., Joseph, A.D., Katz, R.H.: ICEBERG: An Internet-core Network Architecture for Integrated Communications. IEEE Personal Communications Magazine (2000).
[20]
TINA-C: Telecommunications Information Networking Architecture Consortium. http://www.tinac.com/ (web-site).
[21]
Mowbray, T.J., Zahavi, R.: The Essential CORBA: System Integration Using Distributed Objects. Wiley Computer Pub. (1997).
[22]
Vaughan-Nichols, S.J.: Web Services: Beyond the Hype. IEEE Computer (2002).

Cited By

View all
  • (2011)Adaptive data-driven service integrity attestation for multi-tenant cloud systemsProceedings of the Nineteenth International Workshop on Quality of Service10.5555/1996039.1996072(1-9)Online publication date: 6-Jun-2011
  • (2010)Augmenting trust establishment in dynamic systems with social networksProceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research10.1145/1852666.1852748(1-4)Online publication date: 21-Apr-2010
  • (2010)RunTestProceedings of the 5th ACM Symposium on Information, Computer and Communications Security10.1145/1755688.1755724(293-304)Online publication date: 13-Apr-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
Pervasive '02: Proceedings of the First International Conference on Pervasive Computing
August 2002
296 pages
ISBN:3540440607

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 26 August 2002

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2011)Adaptive data-driven service integrity attestation for multi-tenant cloud systemsProceedings of the Nineteenth International Workshop on Quality of Service10.5555/1996039.1996072(1-9)Online publication date: 6-Jun-2011
  • (2010)Augmenting trust establishment in dynamic systems with social networksProceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research10.1145/1852666.1852748(1-4)Online publication date: 21-Apr-2010
  • (2010)RunTestProceedings of the 5th ACM Symposium on Information, Computer and Communications Security10.1145/1755688.1755724(293-304)Online publication date: 13-Apr-2010
  • (2009)QoS-aware service replicationProceedings of the First Asia-Pacific Symposium on Internetware10.1145/1640206.1640214(1-10)Online publication date: 17-Oct-2009
  • (2009)A tentative model for virtualized resource-aware dynamic media-oriented service compositionProceedings of the 4th International Conference on Future Internet Technologies10.1145/1555697.1555713(24-27)Online publication date: 17-Jun-2009
  • (2009)Workflow-based resource allocation to optimize overall performance of composite servicesFuture Generation Computer Systems10.1016/j.future.2008.06.00325:3(199-212)Online publication date: 1-Mar-2009
  • (2005)Resource-aware service composition for video multicast to heterogeneous mobile usersProceedings of the first ACM international workshop on Multimedia service composition10.1145/1099423.1099432(37-46)Online publication date: 11-Nov-2005
  • (2005)Discovering alternate internet paths to enhance end-to-end quality of serviceProceedings of the 2005 ACM conference on Emerging network experiment and technology10.1145/1095921.1095980(280-281)Online publication date: 24-Oct-2005
  • (2004)QoS-Aware Middleware for Web Services CompositionIEEE Transactions on Software Engineering10.1109/TSE.2004.1130:5(311-327)Online publication date: 1-May-2004
  • (2003)QoS-Assured Service Composition in Managed Service Overlay NetworksProceedings of the 23rd International Conference on Distributed Computing Systems10.5555/850929.851962Online publication date: 19-May-2003

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media