Subscription Data

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 198 Experts worldwide ranked by ideXlab platform

Dingfang Chen - One of the best experts on this subject based on the ideXlab platform.

  • A publish/subscribe architecture for sensor networks and applications
    2006 IEEE International Conference on Mechatronics and Automation ICMA 2006, 2006
    Co-Authors: Xinqing Yan, Wen-tong Wang, Wenfeng Li, Dingfang Chen
    Abstract:

    The rapid emergence of computation enabled sensors and the applications that consume the sensor Data introduce the need of new software architecture to enable the rapid development of applications that depends on the Data from multiple sensor networks. We present the Subscribe/Notification architecture for connecting a wide range of sensors, actuators and applications in a robust fashion. The Data elements which are routed to one or more applications are generated from sensors inside of sensor networks whose internals can be hidden from participants. This architecture consists of an overlay network of well-connected dedicated machines that provide topic Subscription, Data stream routing and notification sending from sensors to applications. It also supports filtering and stream Data buffering between sensors and applications. Under this architecture, the tight couple between sensor networks and its applications is broken, and instead the sensor networks are transparent to the application. Experiments show that this architecture is reasonable and achieves good result, © 2006 IEEE.

Ming Shang - One of the best experts on this subject based on the ideXlab platform.

  • Subscription Policy Control Framework for IMS-Based Networks
    Recent Advances in Broadband Integrated Network Operations and Services Management, 2020
    Co-Authors: Nidal Nasser, Ming Shang
    Abstract:

    The Policy and Charging Control (PCC) architecture was firstly introduced in the 3GPP’s Release 7. However, the PCC has its problems. The main problems include the incapability of performing policy control with consideration of subscriber profiles and missing specification on how to organize and express the policy information. In addition, no policy control at application session establishment stage also contributes to its imperfectness. In this paper, the authors propose a Subscription-based policy control framework that implements a Subscription-centered approach for policy control and to enable flexible policy definitions based on the subscriber’s profile at the application level. The framework also provides functionalities of organizing the Subscription Data, identifying the policy, regulating the policy control process, interpreting, managing and enforcing the corresponding policies. The main objective is to qualify the subscribers and thus, enhance the network customization through defining flexible policies based on policy control requirements for different subscribers.

  • Subscription Policy Control Framework for IMS-Based Networks
    International Journal of Business Data Communications and Networking, 2009
    Co-Authors: Nidal Nasser, Ming Shang
    Abstract:

    The Policy and Charging Control (PCC) architecture was firstly introduced in the 3GPP’s Release 7. However, the PCC has its problems. The main problems include the incapability of performing policy control with consideration of subscriber profiles and missing specification on how to organize and express the policy information. In addition, no policy control at application session establishment stage also contributes to its imperfectness. In this paper, the authors propose a Subscription-based policy control framework that implements a Subscription-centered approach for policy control and to enable flexible policy definitions based on the subscriber’s profile at the application level. The framework also provides functionalities of organizing the Subscription Data, identifying the policy, regulating the policy control process, interpreting, managing and enforcing the corresponding policies. The main objective is to qualify the subscribers and thus, enhance the network customization through defining flexible policies based on policy control requirements for different subscribers. [Article copies are available for purchase from InfoSci-on-Demand.com]

  • Policy control framework for IP Multimedia Subsystem
    Proceedings of the 2009 conference on Information Science Technology and Applications - ISTA '09, 2009
    Co-Authors: Nidal Nasser, Ming Shang
    Abstract:

    In this paper, we propose a Subscription-based policy control framework that implements a Subscription-centered approach for policy control for IP Multimedia Subsystem (IMS), defined by 3rd Generation Partnership Project (3GPP), Release 7. The framework also enables flexible policy definitions based on the subscriber's profile at the application level. In addition, the framework provides functionalities of organizing the Subscription Data, identifying the policy, stipulating the policy control process, interpreting, managing and enforcing the corresponding policies. The main objective of this framework is to qualify the subscribers and thus, enhance the network customization reflected by the capabilities of defining various flexible policies based on different subscriber policy control requirements.

Xinqing Yan - One of the best experts on this subject based on the ideXlab platform.

  • A publish/subscribe architecture for sensor networks and applications
    2006 IEEE International Conference on Mechatronics and Automation ICMA 2006, 2006
    Co-Authors: Xinqing Yan, Wen-tong Wang, Wenfeng Li, Dingfang Chen
    Abstract:

    The rapid emergence of computation enabled sensors and the applications that consume the sensor Data introduce the need of new software architecture to enable the rapid development of applications that depends on the Data from multiple sensor networks. We present the Subscribe/Notification architecture for connecting a wide range of sensors, actuators and applications in a robust fashion. The Data elements which are routed to one or more applications are generated from sensors inside of sensor networks whose internals can be hidden from participants. This architecture consists of an overlay network of well-connected dedicated machines that provide topic Subscription, Data stream routing and notification sending from sensors to applications. It also supports filtering and stream Data buffering between sensors and applications. Under this architecture, the tight couple between sensor networks and its applications is broken, and instead the sensor networks are transparent to the application. Experiments show that this architecture is reasonable and achieves good result, © 2006 IEEE.

Christoph Meinel - One of the best experts on this subject based on the ideXlab platform.

  • UIC/ATC/ScalCom - SecPlace: A Security-Aware Placement Model for Multi-tenant SaaS Environments
    2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th I, 2014
    Co-Authors: Eyad Saleh, Johannes Sianipar, Ibrahim Takouna, Christoph Meinel
    Abstract:

    Software-as-a-Service (SaaS) is emerging as a new software delivery model, where the application and its associated Data are hosted in the cloud. Due to the nature of SaaS and the cloud in general, where the Data and the computation are beyond the control of the user, Data privacy and security becomes a vital factor in this new paradigm. In multi-tenant SaaS applications, the tenants (i.e., Companies) become concerned about the confidentiality of their Data since several tenants are consolidated onto a shared infrastructure (i.e., Databases). Consequently, two main questions raise. First, how to prohibit a tenant from accessing other's Data? Second, how to avoid the security threats from co-located competing tenants? In this paper, we address the second question. We present Sec Place, a resource allocation model designed to increase the level of security for tenants sharing the same infrastructure. Sec Place avoids hosting competing companies on the same Database instance. We minimize the risk of co-resident tenants by preventing any two tenants of the same business type to be hosted on the same Database server. Sec Place utilizes the usage of tenant Subscription Data, such as business type and tenant size and place the tenant accordingly. We conduct extensive experiments to validate our approach. The results show that our approach is practical, achieves its goal, and have a moderate complexity.

  • SecPlace: A Security-Aware Placement Model for Multi-tenant SaaS Environments
    Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing 2014 IEEE International Conference on Autonomic and Trusted , 2014
    Co-Authors: Eyad Saleh, Johannes Sianipar, Ibrahim Takouna, Christoph Meinel
    Abstract:

    Software-as-a-Service (SaaS) is emerging as a new software delivery model, where the application and its associated Data are hosted in the cloud. Due to the nature of SaaS and the cloud in general, where the Data and the computation are beyond the control of the user, Data privacy and security becomes a vital factor in this new paradigm. In multi-tenant SaaS applications, the tenants (i.e., companies) become concerned about the confidentiality of their Data since several tenants are consolidated onto a shared infrastructure (i.e., Databases). Consequently, two main questions raise. First, how to prohibit a tenant from accessing other's Data? Second, how to avoid the security threats from co-located competing tenants? In this paper, we address the second question. We present SecPlace, a resource allocation model designed to increase the level of security for tenants sharing the same infrastructure. SecPlace avoids hosting competing companies on the same Database instance. We minimize the risk of co-resident tenants by preventing any two tenants of the same business type to be hosted on the same Database server. SecPlace utilizes the usage of tenant Subscription Data, such as business type and tenant size and place the tenant accordingly. We conduct extensive experiments to validate our approach. The results show that our approach is practical, achieves its goal, and have a moderate complexity.

Wenfeng Li - One of the best experts on this subject based on the ideXlab platform.

  • A publish/subscribe architecture for sensor networks and applications
    2006 IEEE International Conference on Mechatronics and Automation ICMA 2006, 2006
    Co-Authors: Xinqing Yan, Wen-tong Wang, Wenfeng Li, Dingfang Chen
    Abstract:

    The rapid emergence of computation enabled sensors and the applications that consume the sensor Data introduce the need of new software architecture to enable the rapid development of applications that depends on the Data from multiple sensor networks. We present the Subscribe/Notification architecture for connecting a wide range of sensors, actuators and applications in a robust fashion. The Data elements which are routed to one or more applications are generated from sensors inside of sensor networks whose internals can be hidden from participants. This architecture consists of an overlay network of well-connected dedicated machines that provide topic Subscription, Data stream routing and notification sending from sensors to applications. It also supports filtering and stream Data buffering between sensors and applications. Under this architecture, the tight couple between sensor networks and its applications is broken, and instead the sensor networks are transparent to the application. Experiments show that this architecture is reasonable and achieves good result, © 2006 IEEE.