The paper presents a spatial role-based access control (SRBAC) framework and its application to healthcare information systems that allow wireless access to information. The framework secures access to medical information and resources accessible through mobile computing devices by healthcare personal and patients. The framework utilizes location information in access control decisions, in order to determine the permissions a role encompass at a given location. The permissions of a role are changing dynamically depending of role owner movement
{"title":"Location-based security framework for use of handheld devices in medical information systems","authors":"F. Hansen, V. Oleshchuk","doi":"10.1109/PERCOMW.2006.76","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.76","url":null,"abstract":"The paper presents a spatial role-based access control (SRBAC) framework and its application to healthcare information systems that allow wireless access to information. The framework secures access to medical information and resources accessible through mobile computing devices by healthcare personal and patients. The framework utilizes location information in access control decisions, in order to determine the permissions a role encompass at a given location. The permissions of a role are changing dynamically depending of role owner movement","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122138657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The wireless Internet stretches the concept of self-paced learning towards anywhere-anytime learning. It supports the seamless continuation of interaction with learning resources and services even when a student is away from the desktop PC. There is, however, much doubt about the use of omnipresent ICT devices like cellular phones for pedagogically valuable learning settings. In a recently concluded EU project we have examined the potential of such devices for learning by developing a Java-based application, called Histobrick. It supports spontaneous short study phases while students are on the move and particularly aims to provide a ubiquitous tool for examining and deepening a student's knowledge about statistic distributions and their most important characteristic numbers. The pedagogy behind histobrick is inspired by recent ideas about learning in constructivist settings and the findings of game-based learning. The paper sketches the rationale behind histobrick, discusses some technical challenges we met, presents the final solution, and reports on a first evaluation we performed with a small sample of students
{"title":"Exploring the use of cellular phones for pervasive elearning","authors":"B. Krämer, G. Ströhlein","doi":"10.1109/PERCOMW.2006.54","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.54","url":null,"abstract":"The wireless Internet stretches the concept of self-paced learning towards anywhere-anytime learning. It supports the seamless continuation of interaction with learning resources and services even when a student is away from the desktop PC. There is, however, much doubt about the use of omnipresent ICT devices like cellular phones for pedagogically valuable learning settings. In a recently concluded EU project we have examined the potential of such devices for learning by developing a Java-based application, called Histobrick. It supports spontaneous short study phases while students are on the move and particularly aims to provide a ubiquitous tool for examining and deepening a student's knowledge about statistic distributions and their most important characteristic numbers. The pedagogy behind histobrick is inspired by recent ideas about learning in constructivist settings and the findings of game-based learning. The paper sketches the rationale behind histobrick, discusses some technical challenges we met, presents the final solution, and reports on a first evaluation we performed with a small sample of students","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the IEEE 802.15.4 standard, two different operation modes are specified: the beacon-enabled networks, and non-beacon networks. The devices in a beacon-enabled network synchronize with each other and the beacon frame which is treated as synchronization signal also provides some extended features. On the other hand, a beacon-enabled device is hard to implement. Highly processing power is required to meet the constrained timing events and process the beacon packets. In this paper, we propose a priority based scheduling mechanism to implement the beacon-enabled devices. We also evaluate the performance of our implementation. It can be shown that although we use preambles to prevent loss of beacons. They bring almost no impact to the overall performance and duty cycle
{"title":"Design and implementation of IEEE 802.15.4 beacon-enabled network devices","authors":"Li-chun Ko, Yung-Chih Liu, Hua-Wei Fang","doi":"10.1109/PERCOMW.2006.37","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.37","url":null,"abstract":"In the IEEE 802.15.4 standard, two different operation modes are specified: the beacon-enabled networks, and non-beacon networks. The devices in a beacon-enabled network synchronize with each other and the beacon frame which is treated as synchronization signal also provides some extended features. On the other hand, a beacon-enabled device is hard to implement. Highly processing power is required to meet the constrained timing events and process the beacon packets. In this paper, we propose a priority based scheduling mechanism to implement the beacon-enabled devices. We also evaluate the performance of our implementation. It can be shown that although we use preambles to prevent loss of beacons. They bring almost no impact to the overall performance and duty cycle","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125656576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For large scale wireless sensor networks (WSNs), reprogramming sensor nodes through the wireless channel is an important capability. To avoid reprogramming false or viral code images, each sensor node needs to efficiently authenticate its received code image before propagating it. Public key schemes based on elliptic curve cryptography are feasible in WSNs, yet are still very expensive in terms of memory and CPU consumption. In this paper, we propose a hybrid mechanism that combines the speedy verification of hash schemes with the strong authenticity of public key schemes. A hash tree is computed from packetized code and its root is signed by the public key of the base station. Each sensor node can quickly authenticate the data packet as soon as it is received. Simulation shows that the proposed secure reprogramming scheme adds only a modest amount of overhead to a conventional non-secure reprogramming scheme, namely Deluge, and is therefore feasible and practical in a WSN
{"title":"Efficiently authenticating code images in dynamically reprogrammed wireless sensor networks","authors":"Jing Deng, Richard O. Han, Shivakant Mishra","doi":"10.1109/PERCOMW.2006.48","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.48","url":null,"abstract":"For large scale wireless sensor networks (WSNs), reprogramming sensor nodes through the wireless channel is an important capability. To avoid reprogramming false or viral code images, each sensor node needs to efficiently authenticate its received code image before propagating it. Public key schemes based on elliptic curve cryptography are feasible in WSNs, yet are still very expensive in terms of memory and CPU consumption. In this paper, we propose a hybrid mechanism that combines the speedy verification of hash schemes with the strong authenticity of public key schemes. A hash tree is computed from packetized code and its root is signed by the public key of the base station. Each sensor node can quickly authenticate the data packet as soon as it is received. Simulation shows that the proposed secure reprogramming scheme adds only a modest amount of overhead to a conventional non-secure reprogramming scheme, namely Deluge, and is therefore feasible and practical in a WSN","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129285559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raffaella Grieco, Delfina Malandrino, F. Mazzoni, Daniele Riboni
The pervasive and mobile computing scenario is characterized by the heterogeneity of devices used to access services, and by frequent changes in the user's context. This paper presents the integration of two existing frameworks into a context-aware content provisioning system oriented to mobile users. External Web contents can be automatically tailored according to a wide range of context data, including device capabilities, available bandwidth, location, user preferences. The tailoring process is human intervention free. In order to demonstrate the feasibility of our solution, we have developed a prototype location-based service that takes advantage of this architecture
{"title":"Context-aware provision of advanced Internet services","authors":"Raffaella Grieco, Delfina Malandrino, F. Mazzoni, Daniele Riboni","doi":"10.1109/PERCOMW.2006.34","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.34","url":null,"abstract":"The pervasive and mobile computing scenario is characterized by the heterogeneity of devices used to access services, and by frequent changes in the user's context. This paper presents the integration of two existing frameworks into a context-aware content provisioning system oriented to mobile users. External Web contents can be automatically tailored according to a wide range of context data, including device capabilities, available bandwidth, location, user preferences. The tailoring process is human intervention free. In order to demonstrate the feasibility of our solution, we have developed a prototype location-based service that takes advantage of this architecture","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126466473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Umedu, Hiroaki Urabe, Jun Tsukamoto, Kazuki Sato, T. Higashino
In this paper, we propose and evaluate a MANET system to pursue the location and personal information of victims in disaster occurrence where we do not assume any fixed network infrastructures. Our proposing method gathers the information from victims' terminals with GPS receivers using ad-hoc communication through victims' terminals and vehicles. In our system, the disaster area is divided into grids and the data will be cooperatively held by the mobile terminals in each area. If the capacity to hold the data in an area is not enough, apart of the data will be relocated to neighbor areas. We have simulated our system in focus of information gathering rates and information keeping rates. Our experimental results show that the proposed system works effectively
{"title":"A MANET protocol for information gathering from disaster victims","authors":"T. Umedu, Hiroaki Urabe, Jun Tsukamoto, Kazuki Sato, T. Higashino","doi":"10.1109/PERCOMW.2006.78","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.78","url":null,"abstract":"In this paper, we propose and evaluate a MANET system to pursue the location and personal information of victims in disaster occurrence where we do not assume any fixed network infrastructures. Our proposing method gathers the information from victims' terminals with GPS receivers using ad-hoc communication through victims' terminals and vehicles. In our system, the disaster area is divided into grids and the data will be cooperatively held by the mobile terminals in each area. If the capacity to hold the data in an area is not enough, apart of the data will be relocated to neighbor areas. We have simulated our system in focus of information gathering rates and information keeping rates. Our experimental results show that the proposed system works effectively","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130664087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ubiquitous computing has thus far not touched the realm of electronic prescriptions. This paper describes a Jini-based solution for electronic prescriptions, which allows for their wireless transmission to in-range pharmacies and the augmentation of the service levels rendered to the user, with, for instance, information about queue lengths and estimated waiting times being provided to patients. Clinical evaluation of the prototype has highlighted general consensus in respect of its effectiveness, ease of use and usefulness
{"title":"Electronic prescriptions: a ubiquitous solution using Jini","authors":"G. Ghinea, Arash Moradi, S. Asgari, T. Serif","doi":"10.1109/PERCOMW.2006.49","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.49","url":null,"abstract":"Ubiquitous computing has thus far not touched the realm of electronic prescriptions. This paper describes a Jini-based solution for electronic prescriptions, which allows for their wireless transmission to in-range pharmacies and the augmentation of the service levels rendered to the user, with, for instance, information about queue lengths and estimated waiting times being provided to patients. Clinical evaluation of the prototype has highlighted general consensus in respect of its effectiveness, ease of use and usefulness","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116777382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
André Blessing, Stefan Klatt, Hinrich Schütze, D. Nicklas, S. Volz
There are a number of possible sources for information about the environment when creating or updating a context model, including sensorial input, databases, and explicit modeling by the system designer. Another source is natural language, either in the form of electronic text (e.g., the World Wide Web) or speech. In this paper, we investigate the implications for context models when some of their information is derived linguistically with an emphasis on the issues of hybrid models and mapping between entities in language and context model. We present a prototype that tests some of our ideas
{"title":"Language-derived information and context models","authors":"André Blessing, Stefan Klatt, Hinrich Schütze, D. Nicklas, S. Volz","doi":"10.1109/PERCOMW.2006.72","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.72","url":null,"abstract":"There are a number of possible sources for information about the environment when creating or updating a context model, including sensorial input, databases, and explicit modeling by the system designer. Another source is natural language, either in the form of electronic text (e.g., the World Wide Web) or speech. In this paper, we investigate the implications for context models when some of their information is derived linguistically with an emphasis on the issues of hybrid models and mapping between entities in language and context model. We present a prototype that tests some of our ideas","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131440192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giuseppe Alì, E. Bilotta, L. Gabriele, Pietro S. Pantano
The European project COMSON (coupled multiscale simulation and optimization in nanoelectronics) is a Marie Curie RTN project that involves five partners from academia and three from industry world, with the main objective of realising an experimental demonstrator platform (DP) in software code, which comprises coupled simulation of devices, interconnects, circuits, EM fields and thermal effects in one single framework. The DP is the basis for a lifelong e-learning system, devoted to the training and transfer of knowledge within COMSON, in order to promote exchange of resources and to share knowledge. In this paper we give a brief description of COMSON and summarize the characteristics and functionality of MODMAT.net, a prototype e-learning platform realized for the management of information and didactics online. In our intention, this platform is used as the starting point for developing an e-learning platform with high levels of portability and reusability
{"title":"An e-learning platform for academy and industry networks","authors":"Giuseppe Alì, E. Bilotta, L. Gabriele, Pietro S. Pantano","doi":"10.1109/PERCOMW.2006.20","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.20","url":null,"abstract":"The European project COMSON (coupled multiscale simulation and optimization in nanoelectronics) is a Marie Curie RTN project that involves five partners from academia and three from industry world, with the main objective of realising an experimental demonstrator platform (DP) in software code, which comprises coupled simulation of devices, interconnects, circuits, EM fields and thermal effects in one single framework. The DP is the basis for a lifelong e-learning system, devoted to the training and transfer of knowledge within COMSON, in order to promote exchange of resources and to share knowledge. In this paper we give a brief description of COMSON and summarize the characteristics and functionality of MODMAT.net, a prototype e-learning platform realized for the management of information and didactics online. In our intention, this platform is used as the starting point for developing an e-learning platform with high levels of portability and reusability","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"13 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133424682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In most P2P communication services, mobile phones can not access the P2P network without having a proxy server due to their limited capabilities. The implementation of a P2P protocol over mobile phones which enables direct P2P communication between mobile phones is discussed in this paper. We have designed and implemented a P2P protocol in our research group to provide seamless communication across various networks such as the Internet, mobile networks, and home networks. We have implemented the P2P protocol over a mobile phone which had a Bluetooth communication interface. We have also implemented instant message application among mobile phones
{"title":"Design and implementation of P2P protocol for mobile phones","authors":"H. Sumino, N. Ishikawa, Takeshi Kato","doi":"10.1109/PERCOMW.2006.38","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.38","url":null,"abstract":"In most P2P communication services, mobile phones can not access the P2P network without having a proxy server due to their limited capabilities. The implementation of a P2P protocol over mobile phones which enables direct P2P communication between mobile phones is discussed in this paper. We have designed and implemented a P2P protocol in our research group to provide seamless communication across various networks such as the Internet, mobile networks, and home networks. We have implemented the P2P protocol over a mobile phone which had a Bluetooth communication interface. We have also implemented instant message application among mobile phones","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122447739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}