{"title":"Trustworthy pervasive computing: the hard security problems","authors":"Kumar Ranganathan","doi":"10.1109/PERCOMW.2004.1276916","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276916","url":null,"abstract":"We examine five security problems that are barriers to mainstream pervasive computing. These are: device authentication, privacy, trust management, device assurance, recourse, and availability. We argue that the trust, security, and privacy issues inherent in pervasive computing environments present unique challenges that require a fundamental reexamination of how to build large-scale, trustworthy, distributed systems.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133954702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anatomy of a graduate ubiquitous/pervasive computing course","authors":"S. Gupta","doi":"10.1109/PERCOMW.2004.1276940","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276940","url":null,"abstract":"We present the experience in designing and teaching a graduate level ubiquitous computing (Ubicomp) course at Arizona State University. It identifies some of the challenges in teaching an Ubicomp course and presents some solutions. This course was designed for students with no prior exposure to Ubicomp or experience in human computer interaction; and to have minimal overlap with a mobile computing course. Both anonymous end-of-semester and openly solicited feedback indicate that the class was successful in conveying the vision, challenges, and techniques of Ubicomp to a majority of students.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123006260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Al-Muhtadi, S. Chetan, A. Ranganathan, R. Campbell
{"title":"Super spaces: a middleware for large-scale pervasive computing environments","authors":"J. Al-Muhtadi, S. Chetan, A. Ranganathan, R. Campbell","doi":"10.1109/PERCOMW.2004.1276931","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276931","url":null,"abstract":"In previous work [M. Roman et al., (2002)], we introduced a distributed middleware infrastructure for managing physically-bounded, standalone pervasive computing environments, which we refer to as Active Spaces. We extend this middleware to support the organization, management and interactions of large-scale pervasive computing systems built from multiple Active Spaces or other pervasive computing components.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123028146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Peer-to-peer determination of proximity using wireless network data","authors":"J. Meunier","doi":"10.1109/PERCOMW.2004.1276908","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276908","url":null,"abstract":"Observing that some applications require device location information only for calculating relative distances to each other, we propose a proximity measurement algorithm based on wireless network signal strength that requires no calibration and operates in a peer-to-peer way with low overhead. We describe this method and report its precision and recall.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115469703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hands-on course on wireless and mobile systems design","authors":"L. Dasilva, S. Midkiff, I. Chen","doi":"10.1109/PERCOMW.2004.1276939","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276939","url":null,"abstract":"While we cannot make every student an expert on all topics from the wireless channel to mobile application design, we can provide students with a critical understanding of the context for their work in different aspects of wireless systems. We describe the design and development of a hands-on course on wireless and mobile systems design offered at Virginia Tech, integrating topics in wireless networking and mobile computing. Students conduct laboratory experiments and design projects that cover a broad spectrum of issues (from cochannel interference and medium access to routing and addressing, middleware support and mobile application design) that directly affect mobile computing. We describe the structure of the course, outline lecture topics and hands-on exercises, and summarize student feedback to the first offering of the course.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127445532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptive approach to content-based subscription in mobile ad hoc networks","authors":"Eiko Yoneki, J. Bacon","doi":"10.1109/PERCOMW.2004.1276912","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276912","url":null,"abstract":"We describe a novel approach for content-based publish/subscribe system in mobile ad-hoc networks and show preliminary experiment results. We extended ODMRP (on-demand multicast routing protocol) using aggregated summaries of content-based subscriptions in Bloom filters expression for the dynamic construction of an event dissemination structure. ODMRP's mesh topology gives extra reliability. We describe experiment results including comparison with regular ODMRP and mobility simulation.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121132930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A synchronization framework for personal mobile servers","authors":"A. Sinitsyn","doi":"10.1109/PERCOMW.2004.1276933","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276933","url":null,"abstract":"The recent growth in the mobile device market has proven the feasibility of mobile storage based consumer electronics products. One of the key features of personal mobile storage devices is the ability to synchronize content and metadata with other mobile and stationary devices. The main problem addressed is automatic data exchange and synchronization in the domain of personal mobile storage devices or personal servers. We present a synchronization framework for personal servers delivered in the form of user scenarios, derived system requirements, design decisions and a software components structure. The synchronization framework was validated through a working prototype which shows added functionality, such as: connectivity with various types of devices from different vendors, synchronization based on user preferences, content-aware synchronization filtering. In order to abstract from implementation specifics of different network protocols, a high-level object-based storage API has been defined.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133909505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Tripathi, Tanvir Ahmed, D. Kulkarni, Richa Kumar, Komal Kashiramka
{"title":"Context-based secure resource access in pervasive computing environments","authors":"A. Tripathi, Tanvir Ahmed, D. Kulkarni, Richa Kumar, Komal Kashiramka","doi":"10.1109/PERCOMW.2004.1276924","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276924","url":null,"abstract":"We present a system architecture for supporting ubiquitous computing for mobile users across different environments by transparently performing context-based discovery and binding of resources. A ubiquitous computing environment is viewed as a collaboration space among mobile users, system services, and sensors/resources embedded in the physical environment. We present here different policies for binding resources to names in this space. We also present a role based specification model for defining activities.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133988920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Models, protocols, and architectures for secure pervasive computing: challenges and research directions","authors":"Roshan K. Thomas, R. Sandhu","doi":"10.1109/PERCOMW.2004.1276925","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276925","url":null,"abstract":"We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be successful, efforts to build these would have to recognize from the onset that pervasive computing settings are complex socio-technical system and would thus have to go beyond traditional system-centric approaches to analyzing and designing security.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126156726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A toolkit to design adaptable user interfaces in ubiquitous computing environments","authors":"Philippe Debaty","doi":"10.1109/PERCOMW.2004.1276926","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276926","url":null,"abstract":"We describe an architecture to support the rapid development of software applications for mobile devices that can discover and adapt to resources in the environment of the user. To narrow the scope of our research, we focus on media-oriented applications involving the rendering, capture and control of pictures, audio or video. Inspired by the success of software component models, we introduce the concept of adaptive components. An adaptive component is a reusable building block that can discover and adapt to a dynamically changing context to deliver a generic interface functionality. Examples of such functionalities include the capture or playback of various types of media and the control of media services via physical user interfaces or graphical ones. We detail an early implementation of our architecture using Visual C#, UPnP and the Web presence manager distributed platform. We present how we used this implementation to create a simple media rendering service.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129938071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}