Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Putting together QoS and security in autonomic pervasive systems
Alia M., Lacoste M., He R., Eliassen F.  Q2SWinet 2010 (Proceedings of the 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks, Bodrum, Turkey, Oct 20-21, 2010)19-28.2010.Type:Proceedings
Date Reviewed: Feb 14 2011

Quality of service (QoS) is the ability of a set of networked resources--such as network elements, infrastructure devices, host computers, or a myriad of applications--to deliver traffic with minimum delay and maximum availability. Recently, QoS included two elements--secure QoS (or QoS that is secure) and security service QoS--that are services offered against service-level agreements (SLAs). This paper attempts to put these two elements together for pervasive systems and networking, but fails to do so.

The main confusion in the paper arises with the repetition of buzzwords and terms, and the lack of accuracy and clarity across several subject domains, such as software engineering, security, autonomic computing, and algorithm analysis. In addition, the keywords are inconsistently used. Difficulty in understanding arises again when one considers other parts of the proposed model, ranging from subjective to primitive objective parameters in the context of multiple constraints, utility-based use of computing resources, perceived risks, and user preferences.

This model--an extension of previous work by one of the authors--includes “perceived risk level and limitations in computing resources.” The authors offer minimal tangible output or evidence that their system can actually work in a real environment. I would not recommend this paper for understanding QoS.

Reviewer:  Ahmed Patel Review #: CR138786 (1110-1057)
Bookmark and Share
  Reviewer Selected
 
 
Protection Mechanisms (D.2.0 ... )
 
 
Modeling Methodologies (I.6.5 ... )
 
 
Tradeoffs between Complexity Measures (F.2.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Protection Mechanisms": Date
Building secure software: how to avoid security problems the right way
Viega J. (ed), McGraw G., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002.  493, Type: Book (9780201721522)
Apr 22 2002
Pluggable verification modules: an extensible protection mechanism for the JVM
Fong P.  Object-oriented programming, systems, languages, and applications (Proceedings of the 19th Annual ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications, Vancouver, BC, Canada, Oct 24-28, 2004)404-418, 2004. Type: Proceedings
Jul 21 2005
 Traducement: a model for record security
Walcott T., Bishop M. ACM Transactions on Information and System Security 7(4): 576-590, 2004. Type: Article
May 24 2005
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy