scispace - formally typeset
Search or ask a question
Topic

Service provider

About: Service provider is a research topic. Over the lifetime, 55107 publications have been published within this topic receiving 894381 citations. The topic is also known as: external service provider & internal service provider.


Papers
More filters
Patent
18 Oct 1994
TL;DR: In this paper, the authors propose a network architecture that allows a communications service subscriber to select a signaling provider independently of the transport carriers which control the local loops for particular communications services, and the providers of those services.
Abstract: A network architecture is designed to allow a communications service subscriber to select a signaling provider independently of a) the transport carriers which control the local loops for particular communications services, and b) the providers of those services. Upon the establishment of a signaling connection from a subscriber's terminal device to the signaling provider's network, the latter requests those services from the service providers selected by the subscriber for delivery over the local loops of the transport providers.

194 citations

Journal ArticleDOI
TL;DR: This paper proposes a framework for resource allocation to the mobile applications, and revenue management and cooperation formation among service providers, and applies the concepts of core and Shapley value from cooperative game theory as a solution.
Abstract: Mobile cloud computing is an emerging technology to improve the quality of mobile services. In this paper, we consider the resource (i.e., radio and computing resources) sharing problem to support mobile applications in a mobile cloud computing environment. In such an environment, mobile cloud service providers can cooperate (i.e., form a coalition) to create a resource pool to share their own resources with each other. As a result, the resources can be better utilized and the revenue of the mobile cloud service providers can be increased. To maximize the benefit of the mobile cloud service providers, we propose a framework for resource allocation to the mobile applications, and revenue management and cooperation formation among service providers. For resource allocation to the mobile applications, we formulate and solve optimization models to obtain the optimal number of application instances that can be supported to maximize the revenue of the service providers while meeting the resource requirements of the mobile applications. For sharing the revenue generated from the resource pool (i.e., revenue management) among the cooperative mobile cloud service providers in a coalition, we apply the concepts of core and Shapley value from cooperative game theory as a solution. Based on the revenue shares, the mobile cloud service providers can decide whether to cooperate and share the resources in the resource pool or not. Also, the provider can optimize the decision on the amount of resources to contribute to the resource pool.

194 citations

Journal ArticleDOI
TL;DR: A distributed reputation management system (DREAMS) is proposed, wherein VEC servers are adopted to execute local reputation management tasks for vehicles, and the effectiveness of the reputation-based resource allocation algorithm is demonstrated.
Abstract: Vehicular edge computing (VEC) is introduced to extend computing capacity to vehicular network edge recently. With the advent of VEC, service providers directly host services in close proximity of mobile vehicles for great improvements. As a result, a new networking paradigm, vehicular edge networks is emerged along with the development of VEC. However, it is necessary to address security issues for facilitating VEC well. In this paper, we focus on reputation management to ensure security protection and improve network efficiency in the implementation of VEC. A distributed reputation management system ( DREAMS ) is proposed, wherein VEC servers are adopted to execute local reputation management tasks for vehicles. This system has remarkable features for improving overall performance: 1) distributed reputation maintenance; 2) trusted reputation manifestation; 3) accurate reputation update; and 4) available reputation usage. In particular, we utilize multi-weighted subjective logic for accurate reputation update in DREAMS. To enrich reputation usage in DREAMS, service providers optimize resource allocation in computation offloading by considering reputation of vehicles. Numerical results indicate that DREAMS has great advantages in optimizing misbehavior detection and improving the recognition rate of misbehaving vehicles. Meanwhile, we demonstrate the effectiveness of our reputation-based resource allocation algorithm.

194 citations

Journal ArticleDOI
TL;DR: By examining 12 leading digital services, a design taxonomy is developed to be able to classify and contrast digital services and it is hoped that the proposed taxonomy will be useful in understanding the science behind the design of digital services.
Abstract: There has been a gigantic shift from a product based economy to one based on services, specifically digital services. From every indication it is likely to be more than a passing fad and the changes these emerging digital services represent will continue to transform commerce and have yet to reach market saturation. Digital services are being designed for and offered to users, yet very little is known about the design process that goes behind these developments. Is there a science behind designing digital services? By examining 12 leading digital services, we have developed a design taxonomy to be able to classify and contrast digital services. What emerged in the taxonomy were two broad dimensions; a set of fundamental design objectives and a set of fundamental service provider objectives. This paper concludes with an application of the proposed taxonomy to three leading digital services. We hope that the proposed taxonomy will be useful in understanding the science behind the design of digital services.

194 citations

Patent
16 Dec 2002
TL;DR: In this article, a method and system to store and distribute encryption keys commences when a service provider receives a product key from a content provider, and the product key is then stored at the service provider.
Abstract: A method and system to store and distribute encryption keys commences when a service provider receives a product key from a content provider. The service provider encrypts content controlled by the content provider with a secure device public key of a secure device of the service provider. The secure device of the service provider decrypts the product key with the secure device public key and encrypts the product key with a storage key associated with the secure device. The product key is then stored at the service provider.

194 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
90% related
Empirical research
51.3K papers, 1.9M citations
85% related
Information system
107.5K papers, 1.8M citations
82% related
Wireless network
122.5K papers, 2.1M citations
78% related
Health care
342.1K papers, 7.2M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20251
20241
2023732
20221,673
20211,969
20202,684