• Title/Summary/Keyword: Ubiquitous Computing Environment

Search Result 658, Processing Time 0.026 seconds

Requirements Analysis for Access Control Model on Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 접근제어 모델을 위한 요구사항 분석)

  • Oh Sejong;Park Jeho
    • The KIPS Transactions:PartA
    • /
    • v.11A no.7 s.91
    • /
    • pp.563-570
    • /
    • 2004
  • Ubiquitous computing environment requires strong security and privacy. Access control is one of security areas. Access control on Ubiquitous computing is different from it on traditional information systems so that traditional access control models are not suitable for Ubiquitous comput-ing environment. This research defines Ubiquitous computing environment as an access control point of view, and shows requirements to consid-er for developing access control model for Ubiquitous computing environment. It also brings up three implementing types of access control on Ubiquitous computing environment.

A Fundamental Study on the Planning of Classroom Space in the Ubiquitous Environments (유비쿼터스 환경의 교실 공간 계획에 관한 기초적 연구)

  • Cho, Hyun-Ho;Lee, Jae-Hoon
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.14 no.4
    • /
    • pp.4-13
    • /
    • 2007
  • In 21st century, mankind greets an era of ubiquitous computing where physical and virtual space are merged through the innovation of digital and IT(Information Technology), meanwhile ubiquitous computing and network paradigm suggest a new direction which our future educational system should head for. A society where people, computers, and objects can be connected with each other anytime and anywhere, that is, a society of ubiquitous computing where everything in our living space are interconnected by a immense network system may bring a variety of changes into our educational environment in schools. In this study I analysed the forecast of school educational orientation and ubiquitous educational environment and facilities in developed countries, and on the basis of the result, I performed a fundamental work for formation of a ubiquitous classroom environment which is feasible in Korea. In the section of conclusion, I present a model of ubiquitous classroom as a scenario based on ubiquitous computing technology applicable to future classroom environment.

The Impact of Ubiquitous Factors on Intention to Use Mobile Services (유비쿼터스 특성요인이 모바일 서비스의 사용의도에 미치는 영향)

  • Cha, Yoon-Sook;Chung, Moon-Sang
    • The Journal of Information Systems
    • /
    • v.16 no.2
    • /
    • pp.69-91
    • /
    • 2007
  • The mobile computing environment has already matured and mobile services are activated throughout many industries. In the following years, these changes are expected to evolve into a ubiquitous computing environment. In the meantime, whether newly developed information technologies will thrive or diminished depends on user's intention to adopt them. Hence, the necessity of user-centered research considering ubiquitous computing in mobile computing environment is obvious. This study, thus, investigated ubiquitous factors in various literature related to ubiquitous computing and technology acceptance and it proposes a research model of the ubiquitous factors affecting user's intention to use mobile services, in terms of meaning(connectivity, mobility), service(contextual offer), compatibility(compatibility), and infrastructure(privacy, truth). The proposed model is expected to help both researchers and practitioners extend their understanding about the ubiquitous factors in mobile computing environment

  • PDF

A Study on the Design of Architecture on the Application of Ubiquitous Computing (Ubiquitous Computing을 적용한 건축디자인에 관한 연구)

  • Son, Hyun-Suk;Kweon,Young;Kim, Yong-Sung
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2003.05a
    • /
    • pp.200-203
    • /
    • 2003
  • Ubiquitous Computing proposed technology for Next age be presented useful function and easier access by information technology that have existed just online move into physical space. Ubiquitous Computing described 'Anytime, Anywhere, Any device' is Intelligent Environment that help human life in hidden area. This study aimed to search that analyzed what find concept and technical peculiarity in Ubiquitous Computing on architectural vision for demanded elements in architectural design during creating space.

  • PDF

A Study on the Design Concept of Stream Cipher Algorithm in Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서의 스트림 암호 설계 고찰)

  • Kim, Whayoung;Kim, Eunhong
    • Journal of Information Technology Services
    • /
    • v.3 no.1
    • /
    • pp.101-115
    • /
    • 2004
  • The phrase "Ubiquitous Computing" has become popular ever since Mark Weiser used it in an article. It is to realize a computerized environment in which small computers are embedded and cooperate with each other. This environment will support many activities of our daily life. In a Ubiquitous Computing environment, various devices will be connected to the network from houses and buildings. Therefore it is necessary to ensure network security and to protect private data from tapping, falsification and the disguising of identity by others. This study reviews the Ubiquitous Computing technologies in detail and outlines the design concept of the Stream Cipher Algorithm.

Context Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 컨텍스트 접근 제어 고찰)

  • Jung Heon-Man;Lee Se-Hoon
    • KSCI Review
    • /
    • v.14 no.1
    • /
    • pp.175-184
    • /
    • 2006
  • In this paper, we study to two research direction about information security in ubiquitous computing environment. First, researches on context-aware access control using user's context or environment conditions based on role-based control. Second, researches on model for access control about context information in ubiquitous computing utilizing role base access control model. Two research directions are the one of the most important point technology in that embody ubiquitous environment in the actual world.

  • PDF

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF

Design of a Location Management System in the Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서의 위치 데이타 관리 시스템의 설계)

  • Lee, Ki-Young;Kim, Dong-Oh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.115-121
    • /
    • 2007
  • Recently, Location Based Service including tracking and way-finding services has been activated rapidly in the ubiquitous computing environment. According as the ubiquitous computing environment is developed, various types of sensor to acquire various data including location of the moving object are used widely, and acquired sensor data becomes abundant. However, the existing location management system based on a single location sensor is difficult to support LBS efficiently in the ubiquitous computing environment. In this paper, therefore, we propose the location management system in the ubiquitous computing environment that can manage the location data and the various sensor data efficiently. In addition, the location management system adopts the core technology for efficiently storing and transferring a large-volume of various data such as location data and for efficiently processing the various requests from a variety of servers and sensors. Especially, our architecture that is presented in this paper can support context-aware services and autonomous services efficiently in the ubiquitous computing environment.

  • PDF

Ubiscript: A Script Language for Ubiquitous Environment

  • Lee, Min-Kyu;Han, Dong-Soo
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.2
    • /
    • pp.141-149
    • /
    • 2011
  • Many distributed and heterogeneous services and devices are accessible in ubiquitous computing environment, so interoperating those services and devices is one of the key tasks in implementing ubiquitous applications. We used to use script languages in integrating such interoperating components and services. However currently available most script languages are not suitable for ubiquitous environment because there are so diverse forms of interoperation targets such as service objects, web, legacy objects and programmable devices. So it is worthwhile designing a new script language well-suited to ubiquitous environment. In this paper, we propose a new script language, called Ubiscript, for the ubiquitous environment. We develop and adopt several unique language features such as remote scope, multiple contexts, web and legacy objects, remote exception handling, etc. in Ubiscript to overcome the limitations of conventional script languages. In this paper, we also describe the implementation of Ubiscript and its runtime system. A couple of ubiquitous applications were developed in Ubiscript, and the applications are tested on the runtime system. According to our experiences and evaluation, Ubiscript turned out to have a high potential in its expression power and contribution to improving ubiquitous application developers' productivity.

A Statistical Pattern Recognition Method for Providing User Demand in Community Computing (커뮤니티 컴퓨팅에서 사용자 요구 반영을 위한 통계적 패턴 인식 기법)

  • Kim, Sung-Bin;Jung, Hye-Dong;Lee, Hyung-Su;Kim, Seok-Yoon
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.287-289
    • /
    • 2009
  • The conventional computing is a centralizing system, but it has been gradually going to develop ubiquitous computing which moves roles away from the main. The Community Computing, a new paradigm, is proposed to implement environment of ubiquitous computing. In this environment, it is important to accept the user demand. Hence in this paper recognizes pattern of user's activity statistically and proposes a method of pattern estimation in community computing. In addition, user's activity varies with time and the activity has the priority We reflect these. Also, we improve accuracy of the method through Knowledge Base organization and the feedback system. We make program using Microsoft Visual C++ for evaluating performance of proposed method, then simulate it. We can confirm it from the experiment result that using proposal method is better in environment of community computing.

  • PDF