A User-centric Service Framework for Pervasive Computing

Author(s):  
Zhenmin Zhu ◽  
Xiaoli Su ◽  
Jintao Li ◽  
Junbo Guo ◽  
Jian Ye
Author(s):  
Feng Zhu ◽  
Wei Zhu

With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every year, billions of computing devices are built. They are ubiquitously deployed and are gracefully integrated with people and their environments. Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other. Authentication for pervasive service discovery is difficult. In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. It encodes hundreds of authentication messages in a novel code word form. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. A critical privacy challenge can be expressed as a “chicken-andegg problem”: both users and service providers want the other parties to expose sensitive information first. We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.


Author(s):  
Feng Zhu ◽  
Wei Zhu

With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every year, billions of computing devices are built. They are ubiquitously deployed and are gracefully integrated with people and their environments. Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other. Authentication for pervasive service discovery is difficult. In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. It encodes hundreds of authentication messages in a novel code word form. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. A critical privacy challenge can be expressed as a “chicken-and-egg problem”: both users and service providers want the other parties to expose sensitive information first. We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.


Author(s):  
Feng Zhu ◽  
Wei Zhu

In pervasive computing environments, service discovery is an essential step for computing devices to properly discover, configure, and communicate with each other. We introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. Traditional authentication approaches requires much users’ involvement. PrudentExposure encodes hundreds of authentication messages in a novel code word form. Moreover, we discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. In a challenging case, both users and service providers want the other parties to expose sensitive information first. Our model protects both users and service providers.


2002 ◽  
Vol 01 (02) ◽  
pp. 155-163
Author(s):  
Hung-Sheng Chiu ◽  
Chyan Yang

This article describes a successful experience on a software project of Technology Development Program (TDP) of Ministry Of Economic Affairs (MOEA) in Taiwan. It describes the design and implementation of a smart office task framework to automate system integration and to enable user-centric application. To achieve the goal of implicit knowledge accumulation and inheritance, we developed a service framework at the backend for integrating diverse systems seamlessly and an interface agent at the front for hiding complex efforts on manually binding different systems. Based on years of experience in components-based system development with multilayered flow architecture, the ACT (Advanced e-Commerce Technology) laboratory adapted Web Services to wrap various existing systems into a general RPC/RMI format, used ontology to define and integrate new functionalities semantically, and took advantage of agents to enable a user-centric office environment. The design rationale, application scenario, architecture, and future plan are presented.


Sign in / Sign up

Export Citation Format

Share Document