2008 32nd Annual IEEE International Computer Software and Applications Conference 2008
DOI: 10.1109/compsac.2008.283
|View full text |Cite
|
Sign up to set email alerts
|

A QoS and Security Adaptation Model for Autonomic Pervasive Systems

Abstract: The unpredictable fluctuations in computing resources, contexts, and user preferences that characterize pervasive environments have stressed the need for context-aware selfadaptive systems. So far, this research area mostly dealt exclusively with concerns related either to standard QoS or to security. Taking into account trade-offs between these two conflicting concerns is a key issue, since they both compete for the same resources. This paper presents a general adaptivity model that reconciles these two conce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
3
1

Relationship

4
4

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…In this context, project Daidalos [9] deals with the role of user preferences in pervasive systems and proposes handling those via static and dynamic (depending on the case) personalization. Moreover, the topic of profile definition is often implicitly handled through research regarding personalization and QoS in pervasive systems, as for example in [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…In this context, project Daidalos [9] deals with the role of user preferences in pervasive systems and proposes handling those via static and dynamic (depending on the case) personalization. Moreover, the topic of profile definition is often implicitly handled through research regarding personalization and QoS in pervasive systems, as for example in [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…A first component-based adaptation model taking into account QoS and security was sketched by Alia and Lacoste in [3]. In this model (refered to as AL-model in the sequel), adaptation planning is formalized as a component composition selection problem where each implementation of a component type may provide different QoS and/or security properties.…”
Section: Introductionmentioning
confidence: 99%
“…this solution does not scale when the number of concerns increases, meaning that the combination of C concerns for an application typically implies the development of 2 C realizations of this application. Furthermore, adding such concerns into the applications usually introduce trade offs between Quality of Service (QoS) dimensions, such as security level and response time [4] that should be taken into account.…”
Section: Introductionmentioning
confidence: 99%