The Community for Technology Leaders
Green Image
Issue No. 09 - September (2004 vol. 5)
ISSN: 1541-4922
pp: 1
Raquel Hill , University of Illinois at Urbana-Champaign
Jalal Al-Muhtadi , University of Illinois at Urbana-Champaign
Roy Campbell , University of Illinois at Urbana-Champaign
Apu Kapadia , University of Illinois at Urbana-Champaign
Prasad Naldurg , University of Illinois at Urbana-Champaign
Anand Ranganathan , University of Illinois at Urbana-Champaign
Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine networks, processors, and devices with mechanisms, protocols, and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems that are isolated from the public Internet and are context insensitive. This leads to multiple, incompatible subsystems incapable of interoperating, thus making operations, management, and trust difficult. The Heterogeneous Survivable Trusted Information-Assurance Architecture addresses the problem of securing critical information services in large-scale ubiquitous computing environments. Hestia is a programmable middleware solution implemented as a network of middleboxes. These middleboxes form protective layers that isolate CCI services and mediate authorized access to Hestia?s services. They also provide a programmable, distributed, object-oriented framework that enables the integration of security, privacy, and reliability mechanisms in service-access interfaces and implementations.
Hestia, middleware, ubiquitous computing, security, critical cyber infrastructure

A. Ranganathan, A. Kapadia, P. Naldurg, R. Campbell, R. Hill and J. Al-Muhtadi, "A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures," in IEEE Distributed Systems Online, vol. 5, no. , pp. 1, 2004.
94 ms
(Ver 3.3 (11022016))