Resource Management for Pervasive Systems
In pervasive contexts, many different applications, from different providers, will compete for access to resources: physical resources like sensors and actioners, as well as for software resources (services). Sensors provide information about the state of the world, and actioners change the world which can put goods and persons at risk. At least for safety reasons, it is critical to closely control, at any point in time, and in all circumstances, which service(s) are using which resource(s).
Pervasive systems face the difficult challenge of providing some safety, reliability and resilience properties, verified at design and compile time, while executing in many different configurations unknown statically, with dynamic services and devices, competing for resources with unknown applications and facing unpredictable configuration changes. This challenge can be seen from two perspectives: how to design and develop pervasive applications in such a demanding context; how to execute these applications while satisfying the requirements despite the unpredictable context and changes.
This paper discusses the requirements for future pervasive gateways and presents the Apam dynamic service middleware. Apam interprets at run-time a formalism describing the desirable behavior of a system, and enforces this behavior in a very wide range of unplanned configurations while resisting the many changes that may occur.
KeywordsService Oriented Computing Service Selection Service Composition Composite services Software engineering environments
- 1.Cervantes, H., Hall, R.: Autonomous Adaptation to Dynamic Availability Using a Service-Oriented Component Model. In: Proceedings of the International Conference on Software Engineering, May 1. ICSE Edinburgh, Scotland (2004)Google Scholar
- 2.Escoffier, C., Hall, R.S., Lalanda, P.: iPOJO: an Extensible Service-Oriented Component Framework. In: IEEE Int. Conference on Services Computing, USA (July 2007)Google Scholar
- 3.Zhang, W., Hansen, K.: Semantic Web based Self-management for a Pervasive Service Middleware. In: IEEE Int. Conf. on Self-Adaptive and Self-Organizing Systems (2008)Google Scholar
- 6.Gupta, S.K.S., Mukherjee, T., Venkatasubramanian, K.: Criticality Aware Access Control Model for Pervasive Applications. In: ICPCC 2006 (2006)Google Scholar
- 7.Tuttlies, V., Schiele, G., Becker, C.: Comity - conflict avoidance in pervasive computing environments. In: International Workshop on Pervasive Systems (2007)Google Scholar
- 8.Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role Based Access Control. IEEE Computer, 38–47 (1996)Google Scholar
- 12.Moreno-Garcia, D., Estublier, J.: « Model-driven Design, Development, Execution and Management of Service-based Applications. In: SCC, Hawaii, USA (July 2012)Google Scholar
- 13.Estublier, J., Vega, G.: Managing Multiple Applications in a Service Platform. In: Proceeding PESOS: Workshop on Principles of Engineering Service-Oriented Systems, at ICSE Zurich (June 2012)Google Scholar