Sven van der Meer

Learn More
between enterprise applications and networking systems promotes the personalization of services and enables many different types of end-user applications and management operations optimizing the network performance. As result of this free information exchange, we need to facilitate the federation of information between these applications, harmonizing the(More)
The purpose of autonomic networking is to manage the business and technical complexity of networked components and systems. However, existing network management data has no link to business concepts. This makes it very difficult to ensure that services offered by the network are meeting business objectives. This paper describes a novel context-aware policy(More)
– This paper describes a new version of the DEN-ng context model, and how this model in conjunction with the DEN-ng policy model can be used for more effective and flexible context management. Both are part of the FOCALE autonomic network architecture. Context selects policies, which select roles that can be used, which in turn define allowed functionality(More)
Environment-aware Applications and Mobile Communications have proven significant relevance for future telecommunications and computing. This poster describes an approach to integrate heterogeneous off-the-shelf technology to fulfill the demands of environment aware applications. The integration has been done employing a CORBA based middleware. That gave us(More)
In the last two years a variety of concepts for service integration and corresponding systems have gained momentum. On the one hand, they aim for the interworking and integration of classical telecommunications and data communications services, such as telephony, voicemail, fax, e-mail, paging, etc. On the other hand, they are fo-cusing on universal service(More)
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models obsolete. In addition, current security mechanisms are not sufficiently robust to protect each management system and/or subsystem from web-based intrusions, malware, and hacking(More)