Shiva Chetan

Learn More
—Pervasive Computing promotes an environment that blurs the distinction between digital and physical devices and integrates all entities in a physical space into a cohesive programmable unit. Some of the early research activities in pervasive computing focused on developing infrastructures for pervasive applications. These infrastructures successfully(More)
Location awareness significantly enhances the functionality of ubiquitous computing services and applications, and enriches the way they interact with users and resources in the environment. Many different alternative or complementary location sensing technologies are available. However, these technologies give location information in different formats and(More)
In previous work [1], we introduced a distributed middleware infrastructure for managing physically-bounded, standalone pervasive computing environments, which we refer to as Active Spaces. In this paper, we extend this middleware to support the organization, management and interactions of large-scale pervasive computing systems built from multiple Active(More)
Ubiquitous Computing envisions an environment where physical and digital devices are seamlessly integrated. Users can access their applications and data anywhere in the environment. Applications are not bound to any single device and can migrate with the user to different environments. Therefore, application mobility is an important aspect of ubiquitous(More)
Ubiquitous computing enables an environment that assimilates digital and physical devices seamlessly and presents a unified programming interface to the user. Users can program the environment similar to programming a computer. With the widespread availability of personal devices and personal area networks, there is a growing need for personal devices to(More)
We present an OGSI CredentialManager service that allows users to obtain proxy credentials over the network using pass phrase authentication and provides a credential refresh service for long-running jobs. Users can store credentials with the CredentialManager as an alternative to manually managing private key and certificate files. The CredentialManager(More)
Overview One of the functions of the UK e-science security task force is to identify and promulgate good security practice in grid and related systems. Many Grid-based projects have developed distinctive security analyses, requirements, and/or technical solutions to distributed system security, but as yet there is little public record of this activity. The(More)
  • 1