A Component Architecture for the Internet of Things
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Brooks, Christopher | - |
dc.contributor.author | Jerad, Chadlia | - |
dc.contributor.author | Kim, Hokeun | - |
dc.contributor.author | Lee, Edward A. | - |
dc.contributor.author | Lohstroh, Marten | - |
dc.contributor.author | Nouvellet, Victor | - |
dc.contributor.author | Osyk, Beth | - |
dc.contributor.author | Weber, Matt | - |
dc.date.accessioned | 2023-09-18T06:51:22Z | - |
dc.date.available | 2023-09-18T06:51:22Z | - |
dc.date.created | 2023-07-07 | - |
dc.date.issued | 2018-09 | - |
dc.identifier.issn | 0018-9219 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/190774 | - |
dc.description.abstract | In this paper, we describe a component-based software architecture for the Internet of Things in which proxies for Things and services that we call "accessors" interact with one another under a concurrent, time-stamped, discrete-event (DE) semantics. These proxies are analogous to web pages, which proxy a cloud-based service such as a bank, but instead of being designed to interface those services with humans, accessors are designed to interface services and Things with other services and Things. A deterministic DE semantics is combined with a widely used pattern for handling network interactions that we call asynchronous atomic callbacks (AACs). AAC enables many concurrent pending requests to be active at once without blocking and without the treacherous concurrency pitfalls of threads. In effect, our architecture combines AAC with actors where the actor model has been endowed with a temporal semantics. We show how this architecture can leverage the previously reported secure swarm toolkit (SST) to achieve state-of-the-art authentication, authorization, and encryption of interactions across networks. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | A Component Architecture for the Internet of Things | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Hokeun | - |
dc.identifier.doi | 10.1109/JPROC.2018.2812598 | - |
dc.identifier.scopusid | 2-s2.0-85045755257 | - |
dc.identifier.wosid | 000445274600005 | - |
dc.identifier.bibliographicCitation | PROCEEDINGS OF THE IEEE, v.106, no.SI 9, pp.1527 - 1542 | - |
dc.relation.isPartOf | PROCEEDINGS OF THE IEEE | - |
dc.citation.title | PROCEEDINGS OF THE IEEE | - |
dc.citation.volume | 106 | - |
dc.citation.number | SI 9 | - |
dc.citation.startPage | 1527 | - |
dc.citation.endPage | 1542 | - |
dc.type.rims | ART | - |
dc.type.docType | 정기학술지(Article(Perspective Article포함)) | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | Authentication | - |
dc.subject.keywordPlus | Cryptography | - |
dc.subject.keywordPlus | Embedded software | - |
dc.subject.keywordPlus | Internet of things | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordPlus | Semantics | - |
dc.subject.keywordPlus | Websites | - |
dc.subject.keywordAuthor | Accessors | - |
dc.subject.keywordAuthor | Callbacks | - |
dc.subject.keywordAuthor | Discrete Events | - |
dc.subject.keywordAuthor | Embedded Software | - |
dc.subject.keywordAuthor | Internet of Things | - |
dc.subject.keywordAuthor | JavaScript | - |
dc.subject.keywordAuthor | Real Time | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/8343871 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.