首页 > 最新文献

2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.最新文献

英文 中文
Toward secure key distribution in truly ad-hoc networks 在真正的自组织网络中实现安全的密钥分发
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210183
A. Khalili, Jonathan Katz, W. Arbaugh
Ad-hoc networks - and in particular wireless mobile ad-hoc networks $have unique characteristics and constraints that make traditional cryptographic mechanisms and assumptions inappropriate. In particular it may not be warranted to assume pre-existing shared secrets between members of the network or the presence of a common PKI. Thus, the issue of key distribution in ad-hoc networks represents an important problem. Unfortunately, this issue has been largely ignored; as an example, most protocols for secure ad-hoc routing assume that key distribution has already taken place. Traditional key distribution schemes either do not apply in an ad-hoc scenario or are not efficient enough for small, resource-constrained devices. We propose to combine efficient techniques from identity-based (ID-based) and threshold cryptography to provide a mechanism that enables flexible and efficient key distribution while respecting the constraints of ad-hoc networks. We also discuss the available mechanisms and their suitability for the proposed task.
自组织网络——特别是无线移动自组织网络——具有独特的特性和限制,使得传统的加密机制和假设不合适。特别是,假定网络成员之间存在预先存在的共享秘密或存在公共PKI可能是不合理的。因此,自组织网络中的密钥分配问题是一个重要的问题。不幸的是,这个问题在很大程度上被忽视了;例如,大多数用于安全自组织路由的协议都假设已经进行了密钥分发。传统的密钥分发方案要么不适用于临时场景,要么对于小型、资源受限的设备不够有效。我们建议结合基于身份(id)和阈值加密的有效技术,以提供一种机制,在尊重自组织网络约束的同时,实现灵活有效的密钥分发。我们还讨论了可用的机制及其对拟议任务的适用性。
{"title":"Toward secure key distribution in truly ad-hoc networks","authors":"A. Khalili, Jonathan Katz, W. Arbaugh","doi":"10.1109/SAINTW.2003.1210183","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210183","url":null,"abstract":"Ad-hoc networks - and in particular wireless mobile ad-hoc networks $have unique characteristics and constraints that make traditional cryptographic mechanisms and assumptions inappropriate. In particular it may not be warranted to assume pre-existing shared secrets between members of the network or the presence of a common PKI. Thus, the issue of key distribution in ad-hoc networks represents an important problem. Unfortunately, this issue has been largely ignored; as an example, most protocols for secure ad-hoc routing assume that key distribution has already taken place. Traditional key distribution schemes either do not apply in an ad-hoc scenario or are not efficient enough for small, resource-constrained devices. We propose to combine efficient techniques from identity-based (ID-based) and threshold cryptography to provide a mechanism that enables flexible and efficient key distribution while respecting the constraints of ad-hoc networks. We also discuss the available mechanisms and their suitability for the proposed task.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117147635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 360
Applying Kerberos to the communication environment for information appliances 将Kerberos应用于信息设备的通信环境
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210159
S. Sakane, N. Okabe, K. Kamada, H. Esaki
When IPv6 deploys, each information appliance shall have a global IP address and communicate directly with each other. Some devices may have much lower processing performance than PCs have due to various limitations (e.g. cost, physical size, power consumption). Such devices must have a security function, that is confidentiality, integrity and access control, for provision of privacy even with a home networking environment. The information appliances shall move around the global network with the users. We assume these devices are used in the home and we describe the methodologies to achieve access control using Kerberos and to deal with changes of IP addresses using modified Kerberos. IPv6 has a security mechanism called "IPsec" for secure communication. In order to use the IPsec, peering communicating devices have to share a symmetric key to maintain the confidentiality and/or the integrity. We also describe a method so that these restricted devices can share a symmetric key securely.
当部署IPv6时,每个信息设备都应该有一个全局IP地址,并且彼此之间直接通信。由于各种限制(例如成本、物理尺寸、功耗),一些设备的处理性能可能比pc低得多。这些设备必须具有保密性、完整性和访问控制等安全功能,以便在家庭网络环境下提供隐私。信息家电将随着用户在全球网络中移动。我们假设这些设备在家中使用,并描述了使用Kerberos实现访问控制和使用修改后的Kerberos处理IP地址更改的方法。IPv6有一个名为“IPsec”的安全机制,用于安全通信。为了使用IPsec,对等通信设备必须共享一个对称密钥,以保持机密性和/或完整性。我们还描述了一种方法,使这些受限制的设备可以安全地共享对称密钥。
{"title":"Applying Kerberos to the communication environment for information appliances","authors":"S. Sakane, N. Okabe, K. Kamada, H. Esaki","doi":"10.1109/SAINTW.2003.1210159","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210159","url":null,"abstract":"When IPv6 deploys, each information appliance shall have a global IP address and communicate directly with each other. Some devices may have much lower processing performance than PCs have due to various limitations (e.g. cost, physical size, power consumption). Such devices must have a security function, that is confidentiality, integrity and access control, for provision of privacy even with a home networking environment. The information appliances shall move around the global network with the users. We assume these devices are used in the home and we describe the methodologies to achieve access control using Kerberos and to deal with changes of IP addresses using modified Kerberos. IPv6 has a security mechanism called \"IPsec\" for secure communication. In order to use the IPsec, peering communicating devices have to share a symmetric key to maintain the confidentiality and/or the integrity. We also describe a method so that these restricted devices can share a symmetric key securely.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115125847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SNMP in the IPv6 context IPv6环境下的SNMP
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210167
G. Keeni, D. Chakraborty, Kazuhide Koide, N. Shiratori
Monitoring networks is important for operations, management and security as well as for research and development, but with the rapid pace in which the network is evolving and newer protocols are emerging it is becoming a challenge to monitor new generation networks. We describe the protocol implementation and deployment issues that exist in monitoring IPv6 networks using the Internet management protocol SNMP and then discuss some of the measures taken to work around the issues.
监控网络对运营、管理和安全以及研究和开发都很重要,但随着网络的快速发展和新协议的出现,监控新一代网络正成为一项挑战。我们描述了使用互联网管理协议SNMP监控IPv6网络中存在的协议实现和部署问题,然后讨论了围绕这些问题所采取的一些措施。
{"title":"SNMP in the IPv6 context","authors":"G. Keeni, D. Chakraborty, Kazuhide Koide, N. Shiratori","doi":"10.1109/SAINTW.2003.1210167","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210167","url":null,"abstract":"Monitoring networks is important for operations, management and security as well as for research and development, but with the rapid pace in which the network is evolving and newer protocols are emerging it is becoming a challenge to monitor new generation networks. We describe the protocol implementation and deployment issues that exist in monitoring IPv6 networks using the Internet management protocol SNMP and then discuss some of the measures taken to work around the issues.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Securing authentication and privacy in ad hoc partitioned networks 保护临时分区网络中的身份验证和隐私
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210185
Sankar Kaliaperumal
Security is a major concern in the design of modern communication systems. It is particularly challenging with wireless networks such as ad hoc networks. Ad hoc Networks are dynamically reconfigured. For this reason they are vulnerable to several major security threats. This paper focuses on authentication and privacy in partitioned ad hoc networks. We consider the problem of managing revocation lists and discuss privacy issues.
安全是现代通信系统设计中的一个主要问题。对于无线网络(如ad hoc网络)来说,这尤其具有挑战性。Ad hoc网络是动态重新配置的。由于这个原因,它们很容易受到几个主要的安全威胁。本文主要研究了分区自组织网络中的身份验证和隐私问题。我们考虑管理撤销列表的问题,并讨论隐私问题。
{"title":"Securing authentication and privacy in ad hoc partitioned networks","authors":"Sankar Kaliaperumal","doi":"10.1109/SAINTW.2003.1210185","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210185","url":null,"abstract":"Security is a major concern in the design of modern communication systems. It is particularly challenging with wireless networks such as ad hoc networks. Ad hoc Networks are dynamically reconfigured. For this reason they are vulnerable to several major security threats. This paper focuses on authentication and privacy in partitioned ad hoc networks. We consider the problem of managing revocation lists and discuss privacy issues.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127796096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Software compatibility and human interface for DV over IP DV over IP的软件兼容性和人机界面
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210153
T. Hisamatsu, A. Ogawa, Osamu Nakamura, J. Murai, Kazunori Sugiura
We created a high quality video transportation system for broadband networks, using DV (digital video) format. Our implementation was named DVTS (Digital Video Transport System). DVTS supports FreeBSD, NetBSD, Linux, MacOSX, and Windows operating systems. Each operating system has a different interface to interact with an application. For example, MacOS uses a GUI (graphical user interface) to allow end users to run applications with simple mouse and keyboard operation. We have ported DVTS to the MacOSX platform. MacOSX Aqua is an abstraction of a human interface based on a GUI. However, since the MacOSX implementation for the former DVTS is implemented using a CUI (character user interface), it does not assimilate with the MacOSX Aqua abstraction. Additionally, the video playback window for the DVTS receiver is designed with the QuickTime framework in our new system. Abstraction and implementation of DVTS for the Aqua interface is proposed. Due to this research, the usability of DVTS is enhanced.
我们创建了一个高质量的视频传输系统,用于宽带网络,使用DV(数字视频)格式。我们的实现被命名为DVTS(数字视频传输系统)。DVTS支持FreeBSD、NetBSD、Linux、MacOSX和Windows操作系统。每个操作系统都有与应用程序交互的不同接口。例如,MacOS使用GUI(图形用户界面)允许终端用户通过简单的鼠标和键盘操作来运行应用程序。我们已经将DVTS移植到MacOSX平台。MacOSX Aqua是基于GUI的人机界面的抽象。然而,由于MacOSX对前DVTS的实现是使用CUI(字符用户界面)实现的,因此它不能与MacOSX Aqua抽象相同化。此外,DVTS接收机的视频播放窗口设计与QuickTime框架在我们的新系统。提出了面向Aqua接口的DVTS的抽象和实现方法。通过本研究,提高了DVTS的可用性。
{"title":"Software compatibility and human interface for DV over IP","authors":"T. Hisamatsu, A. Ogawa, Osamu Nakamura, J. Murai, Kazunori Sugiura","doi":"10.1109/SAINTW.2003.1210153","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210153","url":null,"abstract":"We created a high quality video transportation system for broadband networks, using DV (digital video) format. Our implementation was named DVTS (Digital Video Transport System). DVTS supports FreeBSD, NetBSD, Linux, MacOSX, and Windows operating systems. Each operating system has a different interface to interact with an application. For example, MacOS uses a GUI (graphical user interface) to allow end users to run applications with simple mouse and keyboard operation. We have ported DVTS to the MacOSX platform. MacOSX Aqua is an abstraction of a human interface based on a GUI. However, since the MacOSX implementation for the former DVTS is implemented using a CUI (character user interface), it does not assimilate with the MacOSX Aqua abstraction. Additionally, the video playback window for the DVTS receiver is designed with the QuickTime framework in our new system. Abstraction and implementation of DVTS for the Aqua interface is proposed. Due to this research, the usability of DVTS is enhanced.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124679917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure link state routing for mobile ad hoc networks 移动自组织网络的安全链路状态路由
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210190
Panos Papadimitratos, Z. Haas
Secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the mobile ad hoc networking (MANET) paradigm. Nevertheless, security enhancements have been proposed mostly for reactive MANET protocols. The proposed secure link state routing protocol (SLSP) provides secure proactive topology discovery, which can be beneficial to network operation in a number of ways. SLSP can be employed as a stand-alone protocol, or fit naturally into a hybrid routing framework, when combined with a reactive protocol. SLSP is robust against individual attackers, is capable of adjusting its scope between local and network-wide topology discovery, and is capable of operating in networks of frequently changing topology and membership.
路由协议的安全运行是移动自组织网络(MANET)范式发展所面临的主要挑战之一。然而,安全增强主要针对响应式MANET协议提出。提出的安全链路状态路由协议(SLSP)提供了安全的主动拓扑发现,可以在许多方面有利于网络的运行。SLSP可以作为独立协议使用,也可以与响应式协议结合使用,自然地融入混合路由框架。SLSP对单个攻击者具有鲁棒性,能够在局部和全网范围的拓扑发现之间调整其范围,能够在拓扑和成员频繁变化的网络中运行。
{"title":"Secure link state routing for mobile ad hoc networks","authors":"Panos Papadimitratos, Z. Haas","doi":"10.1109/SAINTW.2003.1210190","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210190","url":null,"abstract":"Secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the mobile ad hoc networking (MANET) paradigm. Nevertheless, security enhancements have been proposed mostly for reactive MANET protocols. The proposed secure link state routing protocol (SLSP) provides secure proactive topology discovery, which can be beneficial to network operation in a number of ways. SLSP can be employed as a stand-alone protocol, or fit naturally into a hybrid routing framework, when combined with a reactive protocol. SLSP is robust against individual attackers, is capable of adjusting its scope between local and network-wide topology discovery, and is capable of operating in networks of frequently changing topology and membership.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 536
An insight for consequences of e-business: possible case of cross border trading without using hard currency 对电子商务后果的洞察:不使用硬通货的跨境贸易的可能情况
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210143
Shiro Uesugi
E-business has entered into a new era, where new types of payment are present. The payments between the debtor and creditor are not necessarily carried out by traditional "cash vs. goods" style any more. The mechanism of credit enhancement has already been changing as direct settlements increase. In addition, new kind of money is emerging; money that is not issued by the government but the users. There are movements of new local currency systems in Japan. That is not particularly limited within Japan but increasing number can be counted all over the world. Many of those mechanisms utilize the features of electronic settlements. Recently, systems that propose the protocols for P2P settlement are gaining attention. This paper discusses the present evolution of such systems (ex. WAT-system) and foresees what comes next, that is to say, "Local currency becomes global currency" in cross border trading.
电子商务进入了一个新的时代,出现了新的支付方式。债务人和债权人之间的支付不再是以传统的“现金对货物”的方式进行。随着直接结算的增加,信用增信机制已经发生了变化。此外,新型货币正在出现;不是由政府发行,而是由用户发行的货币。日本出现了新的本地货币体系。这种情况并不局限于日本,但在世界各地都在增加。其中许多机制利用了电子结算的特点。最近,提出P2P结算协议的系统备受关注。本文讨论了这类制度(如瓦特制度)目前的演变,并预测了接下来会发生什么,也就是说,在跨境贸易中“本地货币成为全球货币”。
{"title":"An insight for consequences of e-business: possible case of cross border trading without using hard currency","authors":"Shiro Uesugi","doi":"10.1109/SAINTW.2003.1210143","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210143","url":null,"abstract":"E-business has entered into a new era, where new types of payment are present. The payments between the debtor and creditor are not necessarily carried out by traditional \"cash vs. goods\" style any more. The mechanism of credit enhancement has already been changing as direct settlements increase. In addition, new kind of money is emerging; money that is not issued by the government but the users. There are movements of new local currency systems in Japan. That is not particularly limited within Japan but increasing number can be counted all over the world. Many of those mechanisms utilize the features of electronic settlements. Recently, systems that propose the protocols for P2P settlement are gaining attention. This paper discusses the present evolution of such systems (ex. WAT-system) and foresees what comes next, that is to say, \"Local currency becomes global currency\" in cross border trading.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"17 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126962862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Metadata and new challenges 元数据和新挑战
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210192
Ray S. Atarashi, J. Kishigami, S. Sugimoto
Metadata technologies and its standardizations have been developed in many fields such as library science, broadcasting, etc., and they are already in practical use. Content having metadata is easier to manage and discover resources than non-metadata contents. With the growth of the Internet, metadata has become a more important function in the efficient delivery of content to develop interoperability between each metadata set and associations with networks. We describe a few metadata-related activities. We also propose a metadata framework that will allow for the integration of metadata and networks.
元数据技术及其标准化已经在图书馆学、广播学等诸多领域得到发展,并已进入实际应用阶段。具有元数据的内容比非元数据内容更容易管理和发现资源。随着Internet的发展,元数据在内容的有效传递中发挥了越来越重要的作用,从而发展了各元数据集之间的互操作性以及与网络的关联。我们描述了一些与元数据相关的活动。我们还提出了一个元数据框架,允许元数据和网络的集成。
{"title":"Metadata and new challenges","authors":"Ray S. Atarashi, J. Kishigami, S. Sugimoto","doi":"10.1109/SAINTW.2003.1210192","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210192","url":null,"abstract":"Metadata technologies and its standardizations have been developed in many fields such as library science, broadcasting, etc., and they are already in practical use. Content having metadata is easier to manage and discover resources than non-metadata contents. With the growth of the Internet, metadata has become a more important function in the efficient delivery of content to develop interoperability between each metadata set and associations with networks. We describe a few metadata-related activities. We also propose a metadata framework that will allow for the integration of metadata and networks.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114947280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The survey of the mobile Internet, usage and awareness, study for m-commerce 调查移动互联网的使用情况和认知度,研究移动商务
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210140
K. Naruse
Based on the user questionnaires conducted through the Internet, topics such as: purpose and place of access to the mobile Internet; the phone, mail and Web usage patterns; current usage of E-commerce; willingness to use new types of services were analyzed. Responses from various age groups were compiled and evaluated, and the results have shown that the main purpose of access largely depends on the users' age/sex group, and that the main place of use depends on their profession. These results led us to some hypotheses, accordingly.
基于通过互联网进行的用户问卷调查,主题包括:使用移动互联网的目的和地点;电话、邮件和网络使用模式;电子商务的使用现状;分析了使用新型服务的意愿。对不同年龄组别的回应进行了汇编和评估,结果显示上网的主要目的在很大程度上取决于使用者的年龄/性别组别,而主要使用地点则取决于使用者的职业。因此,这些结果使我们产生了一些假设。
{"title":"The survey of the mobile Internet, usage and awareness, study for m-commerce","authors":"K. Naruse","doi":"10.1109/SAINTW.2003.1210140","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210140","url":null,"abstract":"Based on the user questionnaires conducted through the Internet, topics such as: purpose and place of access to the mobile Internet; the phone, mail and Web usage patterns; current usage of E-commerce; willingness to use new types of services were analyzed. Responses from various age groups were compiled and evaluated, and the results have shown that the main purpose of access largely depends on the users' age/sex group, and that the main place of use depends on their profession. These results led us to some hypotheses, accordingly.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130561371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Internet emergency preparedness in the IETF IETF中的互联网应急准备
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210177
K. S. King, S. Bradner
The Internet Emergency Preparedness (ieprep) working group of the IETF is addressing requirements for emergency systems for the Internet and other IP-based networks. The charter of the ieprep group is to produce requirements document(s) that detail specific functions and technologies needed to provide support for emergency preparedness systems in the Internet. These requirements will be published as RFCs, the IETF publication series. These include telephony specific requirements as well as other applications running over the Internet. Existing emergency preparedness systems are based upon circuit-switched network technology and preserving that functionality when these networks are interworked with IP-based networks is a chief concern. In addition, IP networks may offer preferential treatment to emergency communications if augmented with the appropriate mechanisms. The ieprep working group defines requirements that will be fulfilled by the appropriate working groups within the IETF.
IETF的互联网应急准备(ieprep)工作组正在处理互联网和其他基于ip的网络应急系统的需求。应急准备小组的章程是制定需求文件,详细说明为互联网应急准备系统提供支持所需的具体功能和技术。这些需求将作为rfc (IETF出版物系列)发布。这些包括电话特定需求以及在Internet上运行的其他应用程序。现有的应急准备系统基于电路交换网络技术,当这些网络与基于ip的网络互通时,保持其功能是一个主要问题。此外,如果采用适当的机制,IP网络可以为紧急通信提供优惠待遇。ieprep工作组定义需求,这些需求将由IETF内相应的工作组来实现。
{"title":"Internet emergency preparedness in the IETF","authors":"K. S. King, S. Bradner","doi":"10.1109/SAINTW.2003.1210177","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210177","url":null,"abstract":"The Internet Emergency Preparedness (ieprep) working group of the IETF is addressing requirements for emergency systems for the Internet and other IP-based networks. The charter of the ieprep group is to produce requirements document(s) that detail specific functions and technologies needed to provide support for emergency preparedness systems in the Internet. These requirements will be published as RFCs, the IETF publication series. These include telephony specific requirements as well as other applications running over the Internet. Existing emergency preparedness systems are based upon circuit-switched network technology and preserving that functionality when these networks are interworked with IP-based networks is a chief concern. In addition, IP networks may offer preferential treatment to emergency communications if augmented with the appropriate mechanisms. The ieprep working group defines requirements that will be fulfilled by the appropriate working groups within the IETF.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127193311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1