2009 IEEE Symposium on Computers and Communications 2009
DOI: 10.1109/iscc.2009.5202267
|View full text |Cite
|
Sign up to set email alerts
|

Service level negotiation in ubiquitous environments

Abstract: The goal of the ubiquitous connectivity is to enable mobile users to be permanently and transparently connected to the Internet, with the desired quality of service. In such an environment, it becomes very difficult for service providers to satisfy the needs of users. A solution is to assign a profile to each user in order to optimize and automate the dynamic service level negotiation. These mobile users are often connected to wireless networks and consuming services that require quality ofservice guarantees s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…• In addition, WebID Incubator Group [15] -W3C research group, has developed FOAF+SSL [78]- [61], which is a safe authentication protocol that allows using of this kind of access control ontologies. It is a oneconnection authentication system that uses the SSL layer [48,99] virtually built in every web browser that uses HTTPS. It is based on WebID [61], a Web identification system based on URIs.…”
Section: Security In Semantic Webmentioning
confidence: 99%
“…• In addition, WebID Incubator Group [15] -W3C research group, has developed FOAF+SSL [78]- [61], which is a safe authentication protocol that allows using of this kind of access control ontologies. It is a oneconnection authentication system that uses the SSL layer [48,99] virtually built in every web browser that uses HTTPS. It is based on WebID [61], a Web identification system based on URIs.…”
Section: Security In Semantic Webmentioning
confidence: 99%
“…This information is related to user, application, terminal and access network [1]. It is collected by the user terminal and allows it to specify the SLS to negotiate with domains managers involved in service offer.…”
Section: B Qos and Security Negotiation Protocol For Mobile Usersmentioning
confidence: 99%
“…This protocol uses web services to provide all the negotiation parts with interoperability. The negotiation process is based on a user profile to automate the adaptation of the service level to the changes occurring on the user context [1]. Some tests were performed to check the good functioning of our SLNP implementation and evaluate its performances like mean negotiation time and size of exchanged messages [2].…”
Section: Introductionmentioning
confidence: 99%