{"title":"A Policy-Based, Secure Access Control Mechanism for Network Roaming Infrastructures","authors":"Tetsuo Imai, Hideaki Goto, H. Sone","doi":"10.1109/SAINT-W.2007.12","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.12","url":null,"abstract":"In the Internet society, IP address is treated as information of organization. This is a problem that visitor uses IP address of visited organization because IP address user of visited organization is treated as a member of the organization. For that, the user's access to home resources may be blocked by firewalls because the user's IP address is not home's one. Therefore an application of authentication and access control is needed. The requirements for authentication and access control method are summarized to six items; (1) getting accessibility to the Internet by using a user credential of the home. (2) Keeping accessibility to home resources. (3) Keeping a local accessibility to visited resources for the visitor. (4) Getting enough security along the wireless/wired channel. (5) Authenticating a user, and trusting by the result, and assigning an IP address of visited organization. (6) By the authentication information, keeping accessibility to the Internet by using a home IP address. The authors investigate the existing methods and point out the merit and demerit for these requirements. Finally, the authors propose a method named 'campus ubiquitous network' that fulfill these all requirements","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127313600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing Variability of Mobile Value Added Service in Framework","authors":"Xingping Huang, Peng Xu, Fangchun Yang","doi":"10.1109/SAINT-W.2007.61","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.61","url":null,"abstract":"Great variability is the most important character in the development of mobile value added service in 3G era. For effectively meet the exploding need of diversified mobile value added services, service variability control mechanism in framework is focused on in this paper. Based on the analysis of service requirement in 3G era, a component oriented service framework for mobile value added service (COSFoMS) as infrastructure of service platform is brought forward firstly. Then service variability control mechanism based on framework in three dimensions is introduced and discussed in detail","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116426495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Invited Talk: Solutions for a Service Architecture in Pervasive Environments Based on WWRF WG2 Requirements","authors":"K. David, O. Drögehorn, M. Klemettinen","doi":"10.1109/SAINT-W.2007.56","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.56","url":null,"abstract":"The vision of pervasive computing and communication is likely to have a major impact on our lives. The WWRF (Wireless World Research Forum) has summarized this vision by the statement: \"7 trillion wireless devices serving 7 billion people by 2017\". Following this vision, the goal for new business sectors will be to provide an easy way of creating and deploying different kinds of service environments. This paper introduces the requirements on and the problem of overall architectures for service execution environments and identifies an architectural approach, the requirements and design guidelines to built service execution environments and related platforms. The concepts presented in this paper have partly been developed by the Wireless World Research Forum (WWRF) Working Group 2 (WG2) and are under ongoing discussion","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116750709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content Cruising System under Dense Region of Mobile Nodes","authors":"T. Ishida, Masayoshi Imaike","doi":"10.1109/SAINT-W.2007.34","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.34","url":null,"abstract":"We are developing \"content cruising system (CCS)\" which is a decentralized and autonomous distribution system for location-based content. CCS is constructed by each mobile nodes working cooperatively. The content which is made in CCS is carried to its destination and remains there by multihop wireless ad-hoc communications among mobile nodes. Considering scalability, \"numbers of nodes\" and \"numbers of content\" must be considered because these two uncertain factors cause heavy traffic on wireless network. In this paper, we present our approach to avoid these problems under dense region of mobile nodes","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128574899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Invited Talk: Appliance Defined Ubiquitous Network","authors":"H. Ichikawa, M. Shimizu, K. Akabane","doi":"10.1109/SAINT-W.2007.54","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.54","url":null,"abstract":"Many devices are expected to be networked with wireless appliances such as radio frequency identification (RFID) tags and wireless sensors, and the number of networked wireless appliances will greatly exceed the number of PCs and mobile telephones . This may lead to an essential change in the network architecture. This paper proposes a new network architecture called the appliance defined ubiquitous network (ADUN), in which wireless appliances will be networked without network protocol standards. Wireless space information rather than an individual appliance signal is carried over the ADUN in the form of a stream with strong privacy/security control. It should be noted that this is different from the architectural principles of the Internet. We discuss a network-appliance interface that is sustainable over a long term, and show that the overhead of the ADUN will be within the scope of the broadband network in the near future","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123623677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Community Entertainment Services Composition on Next Generation Mobile Network IP Multimedia Subsystem","authors":"Yasuhiro Araki, Akio Yamamoto, Michael Sweeney","doi":"10.1109/SAINT-W.2007.44","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.44","url":null,"abstract":"With the advent of Web services and dynamic service composition, flexible and adaptable complex services may be realized. Assuming that such services have been provided with all the necessary service orchestration and end user information, simple services may be enhanced with contextual information, such as location, presence and user preferences, to provide a more tailored experience for the end user. Mobile next generation service environments include many functional components suitable for the provision of contextual data with which to build tailored and complex services for subscribers. Specifically, the IP multimedia subsystem (IMS) defined by 3rd Generation Partnership Project (3GPP) and its enablers provide an interesting environment for researching techniques for the composition and delivery of complex context-specific personalized and community services to mobile users. In this paper we discuss our ongoing research into dynamic service composition for mobile communities. As such, we investigate community-based mobile entertainment services, their provisioning requirements, enablers, and dynamic composition of group-specific real-time next generation packet mobile services. To the end, we have developed a service platform called the group entertainment service platform (GESP) for IMS that we describe in detail","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121194629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements for a Standardized Flow Storage Solution","authors":"B. Trammell, E. Boschi, L. Mark, T. Zseby","doi":"10.1109/SAINT-W.2007.91","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.91","url":null,"abstract":"IP flow data provides input for accounting, traffic engineering and security applications. The storage of flow data is required to allow off-line processing, archiving, and sharing of traffic traces. Currently this is achieved with a variety of proprietary solutions, which results in a variety of formats as input for flow processing tools and hinders data sharing and tool reusability. In this paper we analyze the requirements for a standard file format for storing flow data, and propose using the upcoming standard IP flow information export protocol (IPFIX) as a basis for its design","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124319579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael Sutterer, Olivier Coutand, O. Drögehorn, K. David, Kees van der Sluijs
{"title":"Managing and Delivering Context-Dependent User Preferences in Ubiquitous Computing Environments","authors":"Michael Sutterer, Olivier Coutand, O. Drögehorn, K. David, Kees van der Sluijs","doi":"10.1109/SAINT-W.2007.60","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.60","url":null,"abstract":"We present a user profile management component for ubiquitous computing environments that provides management, inquiry and delivery of context-dependent user preferences. In particular, our approach takes into account that users act differently depending on their current context, and hence, that a user can be described by different submodels that represent the user's preferences within different contexts. Furthermore, our approach takes into account that different applications usually adhere to different semantics","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126000999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Management for Context Transponders","authors":"M. Fahrmair, W. Sitou, B. Spanfelner","doi":"10.1109/SAINT-W.2007.86","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.86","url":null,"abstract":"While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to run sophisticated full scale approaches like DRM and strong encryption. These devices however, play an important role in the success of ubiquitous computing as they support the idea of pervasiveness (small, mobile etc.). We propose a set of techniques outlined as the CTP-classmark that aims to introduce data avoidance and obfuscation strategies to enable information security in context aware applications. Using this classmark, the users' privacy can be protected even on low resource devices and hence the users' trust in ubicomp applications will rise","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116168250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecture of Scalable Embedded Device Management System with Configurable Plug-In Translator","authors":"H. Ochiai, H. Esaki","doi":"10.1109/SAINT-W.2007.28","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.28","url":null,"abstract":"Ubiquitous computer network shall include wide variety of devices. This means that the ubiquitous network certainly increases the heterogeneity of nodes connected to the Internet, while increasing the number of nodes. This paper proposes a system architecture to solve this architectural challenge by the introduction of two sub-systems: \"configurable plug-in translator system77 and \"dynamic management script resolver system77. The translator system provides generalized interfaces to applications, by absorbing the heterogeneous low-level interfaces with script execution engine. The behavior of every remote node is described by the script language. The resolver system achieves a global scale script repository, using DNS, inheriting the advantages of DNS, i.e., scalability, robustness and authority management capability. The integration of these two sub-systems autonomously provides application software with generalized interfaces to access any remote device node on the global Internet","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123217752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}