Pub Date : 1900-01-01DOI: 10.5220/0002477100130020
Javier Muñoz, V. Pelechano, Carlos Cetina
Current pervasive systems are developed ad-hoc or using implementation frameworks. These approaches could be not enough when dealing with large and complex pervasive systems. This paper introduces an implementation of a pervasive system for managing a meeting room. This system has been developed using a model driven method proposed by the authors. The system is specified using PervML, a UML-like modeling language. Then, a set of templates are applied to the specification in order to automatically produce Java code that uses an OSGi-based framework. The final application integrates several technologies like EIB and Web Services. Three different user interfaces are provided for interacting with the system.
{"title":"Implementing a Pervasive Meeting Room: A Model Driven Approach","authors":"Javier Muñoz, V. Pelechano, Carlos Cetina","doi":"10.5220/0002477100130020","DOIUrl":"https://doi.org/10.5220/0002477100130020","url":null,"abstract":"Current pervasive systems are developed ad-hoc or using implementation frameworks. These approaches could be not enough when dealing with large and complex pervasive systems. This paper introduces an implementation of a pervasive system for managing a meeting room. This system has been developed using a model driven method proposed by the authors. The system is specified using PervML, a UML-like modeling language. Then, a set of templates are applied to the specification in order to automatically produce Java code that uses an OSGi-based framework. The final application integrates several technologies like EIB and Web Services. Three different user interfaces are provided for interacting with the system.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121001447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002499800490061
Elena Vildjiounaite, P. Alahuhta, P. Ahonen, David Wright, M. Friedewald
Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy due to constant information collection by numerous tiny sensors, active information exchange over short and long distances, long-term storage of large quantities of data, and reasoning on collected and stored data. An analysis of more than 100 Ubicomp scenarios, however, shows that applications nowadays are often developed without considering privacy issues. This paper suggests guidelines for estimation of threats to privacy, depending on real world application settings and on choice of technology; and guidelines for developing technological safeguards against privacy threats.
{"title":"Design Guidelines for Analysis and Safeguarding of Privacy Threats in Ubicomp Applications","authors":"Elena Vildjiounaite, P. Alahuhta, P. Ahonen, David Wright, M. Friedewald","doi":"10.5220/0002499800490061","DOIUrl":"https://doi.org/10.5220/0002499800490061","url":null,"abstract":"Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy due to constant information collection by numerous tiny sensors, active information exchange over short and long distances, long-term storage of large quantities of data, and reasoning on collected and stored data. An analysis of more than 100 Ubicomp scenarios, however, shows that applications nowadays are often developed without considering privacy issues. This paper suggests guidelines for estimation of threats to privacy, depending on real world application settings and on choice of technology; and guidelines for developing technological safeguards against privacy threats.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124369147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002671301700179
E. Pagani, Stefano Tebaldi, G. P. Rossi
Specifications of some applications based on the Bluetooth protocol stack have already been standardized by the Bluetooth Special Interest Group. Those applications can however be accessed inside a piconet, while Bluetooth devices belonging to different piconets are not able so far of cooperating in a distributed application. In this paper, a framework is proposed that allows a Bluetooth device to search for services provided by other devices, also in case they are connected to different piconets that communicate through a wired network. The proposed framework has been implemented on a testbed platform and its suitability has been tested by using it to distribute a file transfer service over a heterogeneous network.
{"title":"A Service Discovery Infrastructure for Heterogeneous Wired/Bluetooth Networks","authors":"E. Pagani, Stefano Tebaldi, G. P. Rossi","doi":"10.5220/0002671301700179","DOIUrl":"https://doi.org/10.5220/0002671301700179","url":null,"abstract":"Specifications of some applications based on the Bluetooth protocol stack have already been standardized by the Bluetooth Special Interest Group. Those applications can however be accessed inside a piconet, while Bluetooth devices belonging to different piconets are not able so far of cooperating in a distributed application. In this paper, a framework is proposed that allows a Bluetooth device to search for services provided by other devices, also in case they are connected to different piconets that communicate through a wired network. The proposed framework has been implemented on a testbed platform and its suitability has been tested by using it to distribute a file transfer service over a heterogeneous network.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127903130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002658701390146
Dadong Wan, A. Gershman
Ensuring personal safety for people on the move is becoming a heightened priority in today’s uncertain environment. Traditional approaches are no longer adequate in meeting rising demands in personal security. In this paper, we describe VIRTUAL PERSONAL SECURITY, a research prototype that demonstrates how technologies, such as ubiquitous surveillance cameras, location-aware PDAs and cell phones, wireless networks, and Web Services can be brought together to create a virtualized personal security service. By incorporating automatic service discovery, situated sensing and multimedia communication, the novel solution provides consumers with increasing availability, lower cost, and high flexibility. It also creates a new market for just-in-time micro security services, providing the owners of surveillance cameras a new revenue stream.
{"title":"Protecting People on the Move through Virtual Personal Security","authors":"Dadong Wan, A. Gershman","doi":"10.5220/0002658701390146","DOIUrl":"https://doi.org/10.5220/0002658701390146","url":null,"abstract":"Ensuring personal safety for people on the move is becoming a heightened priority in today’s uncertain environment. Traditional approaches are no longer adequate in meeting rising demands in personal security. In this paper, we describe VIRTUAL PERSONAL SECURITY, a research prototype that demonstrates how technologies, such as ubiquitous surveillance cameras, location-aware PDAs and cell phones, wireless networks, and Web Services can be brought together to create a virtualized personal security service. By incorporating automatic service discovery, situated sensing and multimedia communication, the novel solution provides consumers with increasing availability, lower cost, and high flexibility. It also creates a new market for just-in-time micro security services, providing the owners of surveillance cameras a new revenue stream.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129289603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002572801010110
P. Belsis, A. Malatras, S. Gritzalis, C. Skourlas, Ioannis Chalaris
Pervasive environments introduce a technological paradigm shift, giving a new impetus to the functionality of applications, overcoming applicability barriers of legacy applications. Electronic healthcare records management can clearly benefit from the new challenges brought by this emerging technology, due to its low cost and high percentage of user adoption. Still, the sensitivity of medical data, poses new requirements in the design of a secure infrastructure based on the ad-hoc networking schema, which underlies pervasive environments. User authorization and controlled access to information is of outmost importance. This paper proposes a management system for electronic healthcare records satisfying the aforementioned security requirements.
{"title":"Pervasive Secure Electronic Healthcare Records Management","authors":"P. Belsis, A. Malatras, S. Gritzalis, C. Skourlas, Ioannis Chalaris","doi":"10.5220/0002572801010110","DOIUrl":"https://doi.org/10.5220/0002572801010110","url":null,"abstract":"Pervasive environments introduce a technological paradigm shift, giving a new impetus to the functionality of applications, overcoming applicability barriers of legacy applications. Electronic healthcare records management can clearly benefit from the new challenges brought by this emerging technology, due to its low cost and high percentage of user adoption. Still, the sensitivity of medical data, poses new requirements in the design of a secure infrastructure based on the ad-hoc networking schema, which underlies pervasive environments. User authorization and controlled access to information is of outmost importance. This paper proposes a management system for electronic healthcare records satisfying the aforementioned security requirements.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116052186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002676800110017
Santtu Toivonen, Heikki Helin, M. Laukkanen, Tapio Pitkäranta
Abstract. We outline an approach for adapting software agent conversations between a mobile client and a service provider. The adaptation takes advantage of the context information characterizing the client’s current situation. The service provider takes this context information into account when selecting / creating a suitable interaction protocol for communicating with the client. Both the context information and the interaction protocol descriptions are based on ontologies, which are assumed to be known by the conversating agents.
{"title":"Context-Sensitive Conversation Patterns for Agents in Wireless Environments","authors":"Santtu Toivonen, Heikki Helin, M. Laukkanen, Tapio Pitkäranta","doi":"10.5220/0002676800110017","DOIUrl":"https://doi.org/10.5220/0002676800110017","url":null,"abstract":"Abstract. We outline an approach for adapting software agent conversations between a mobile client and a service provider. The adaptation takes advantage of the context information characterizing the client’s current situation. The service provider takes this context information into account when selecting / creating a suitable interaction protocol for communicating with the client. Both the context information and the interaction protocol descriptions are based on ontologies, which are assumed to be known by the conversating agents.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134161183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002662201470159
Rui He, J. Niu, Jianping Hu, Jian Ma
In the future world filled with pervasive computing, almost all entities can be mobile, which means not only service requesters but also service providers are always dynamic and unpredictable. This raises two security problems. For service providers, how can they keep their security capability when they move here and there? And for service requesters, how can they be trusted by various service providers that may have different security requirements? Unfortunately, available security mechanisms, including traditional authentication and authorization approaches and exotic trust management proposals, cannot solve the both two problems very well. In this paper, we propose a context-aware entity recognition scheme, which enables service providers to use their current trust infrastructures to determine whether requesters are trustworthy or not, and also enables service requesters to be recognized through exchanging different information with service providers according to different services they request and different security level service providers require. We argue for the notion of “Trust Infrastructure”, which is an abstract of all available trusted entities that can help an entity to recognize strangers in pervasive environments and can be dynamically built when entities move about. We also argue for an attribute-based recognition information exchange scheme, which makes it possible for service requesters to be checked in terms of trustworthiness in various scenarios. Finally, we give an algorithm to compute a service requester’s trust value based on the trust infrastructure of the service provider entity..
{"title":"A Context-Aware Entity Recognition Scheme for Pervasive Computing","authors":"Rui He, J. Niu, Jianping Hu, Jian Ma","doi":"10.5220/0002662201470159","DOIUrl":"https://doi.org/10.5220/0002662201470159","url":null,"abstract":"In the future world filled with pervasive computing, almost all entities can be mobile, which means not only service requesters but also service providers are always dynamic and unpredictable. This raises two security problems. For service providers, how can they keep their security capability when they move here and there? And for service requesters, how can they be trusted by various service providers that may have different security requirements? Unfortunately, available security mechanisms, including traditional authentication and authorization approaches and exotic trust management proposals, cannot solve the both two problems very well. In this paper, we propose a context-aware entity recognition scheme, which enables service providers to use their current trust infrastructures to determine whether requesters are trustworthy or not, and also enables service requesters to be recognized through exchanging different information with service providers according to different services they request and different security level service providers require. We argue for the notion of “Trust Infrastructure”, which is an abstract of all available trusted entities that can help an entity to recognize strangers in pervasive environments and can be dynamically built when entities move about. We also argue for an attribute-based recognition information exchange scheme, which makes it possible for service requesters to be checked in terms of trustworthiness in various scenarios. Finally, we give an algorithm to compute a service requester’s trust value based on the trust infrastructure of the service provider entity..","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133892609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002564000190027
D. López-de-Ipiña, Juan Ignacio Vázquez, D. Sainz
The latest mobile phones are offering more multimedia features, better communication capabilities (Bluetooth, GPRS, 3G) and are far more easily programmable (extensible) than ever before. So far, the “killer apps” to exploit these new capabilities have been presented in the form of MMS (Multimedia Messaging), video conferencing and multimedia-on-demand services. We deem that a new promising application domain for the latest Smart Phones is their use as intermediaries between us and our surrounding environment. Thus, our mobiles will behave as personal butlers who assist us in our daily tasks, taking advantage of the computational services provided at our working or living environments. For this to happen, a key element is to add senses to our mobiles: capability to see (camera), hear (michrophone), notice (Bluetooth) the objects and devices offering computational services. In this paper, we present a solution to this issue, the MobileSense system. We illustrate its use in two scenarios: (1) making mobiles more accessible to people with disabilities and (2) enabling the mobiles as guiding devices within a museum.
{"title":"Interacting with our Environment through Sentient Mobile Phones","authors":"D. López-de-Ipiña, Juan Ignacio Vázquez, D. Sainz","doi":"10.5220/0002564000190027","DOIUrl":"https://doi.org/10.5220/0002564000190027","url":null,"abstract":"The latest mobile phones are offering more multimedia features, better communication capabilities (Bluetooth, GPRS, 3G) and are far more easily programmable (extensible) than ever before. So far, the “killer apps” to exploit these new capabilities have been presented in the form of MMS (Multimedia Messaging), video conferencing and multimedia-on-demand services. We deem that a new promising application domain for the latest Smart Phones is their use as intermediaries between us and our surrounding environment. Thus, our mobiles will behave as personal butlers who assist us in our daily tasks, taking advantage of the computational services provided at our working or living environments. For this to happen, a key element is to add senses to our mobiles: capability to see (camera), hear (michrophone), notice (Bluetooth) the objects and devices offering computational services. In this paper, we present a solution to this issue, the MobileSense system. We illustrate its use in two scenarios: (1) making mobiles more accessible to people with disabilities and (2) enabling the mobiles as guiding devices within a museum.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125128281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002574100750081
F. Martin, K. Par, Kareem Abu-Zahra, Vasiliy Dulsky, A. Chanler
The iCricket is a new internet-enabled embedded control board with built-in motor and sensor interface circuits. It is designed for use by pre-college students and other programming novices. It includes a Logo virtual machine with extensions that allow networked iCrickets communicate with one another, retrieving sensor values and remotely running each other’s Logo procedures. The underlying implementation uses standard HTTP protocols. The iCricket’s key contribution is that it will allow programming novices (children, artists, and other non-engineers) to implement pervasive computing applications with an easy-touse, interactive language (Logo). This paper focuses the iCricket hardware and software design. Later work will evaluate results of using the design with various users.
{"title":"iCricket: A Programmable Brick for Kids' Pervasive Computing Applications","authors":"F. Martin, K. Par, Kareem Abu-Zahra, Vasiliy Dulsky, A. Chanler","doi":"10.5220/0002574100750081","DOIUrl":"https://doi.org/10.5220/0002574100750081","url":null,"abstract":"The iCricket is a new internet-enabled embedded control board with built-in motor and sensor interface circuits. It is designed for use by pre-college students and other programming novices. It includes a Logo virtual machine with extensions that allow networked iCrickets communicate with one another, retrieving sensor values and remotely running each other’s Logo procedures. The underlying implementation uses standard HTTP protocols. The iCricket’s key contribution is that it will allow programming novices (children, artists, and other non-engineers) to implement pervasive computing applications with an easy-touse, interactive language (Logo). This paper focuses the iCricket hardware and software design. Later work will evaluate results of using the design with various users.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002576700280038
M. Kirchhof, Philipp Stinauer
This paper deals with eHome systems. We focus on theservice composition in order to reduce complexity and to leverage maintainability and extensibility of eHome services. Talking about services, we mean any piece of software, which is executed in a network environment, making the usage and administration of ubiquitous appliances easier. Current situation is, that the complete functionality is hard-coded into services without the facilities to be extended or reused. Many logical correlations (e.g., how to react if an alarm condition is raised) are made explicit in an inappropriate way. To tackle this problem, we introduce a declarative approach to specify logical correlations and to combine functionalities and services to new services, offering the required flexibility and comprehen-
{"title":"Service Composition in eHome Systems: A Rule-based Approach","authors":"M. Kirchhof, Philipp Stinauer","doi":"10.5220/0002576700280038","DOIUrl":"https://doi.org/10.5220/0002576700280038","url":null,"abstract":"This paper deals with eHome systems. We focus on theservice composition in order to reduce complexity and to leverage maintainability and extensibility of eHome services. Talking about services, we mean any piece of software, which is executed in a network environment, making the usage and administration of ubiquitous appliances easier. Current situation is, that the complete functionality is hard-coded into services without the facilities to be extended or reused. Many logical correlations (e.g., how to react if an alarm condition is raised) are made explicit in an inappropriate way. To tackle this problem, we introduce a declarative approach to specify logical correlations and to combine functionalities and services to new services, offering the required flexibility and comprehen-","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115652445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}