140 research outputs found

    Software Development Support for Ambient Assisted Living

    Get PDF
    Key issues in software development support for Ambient Intelligence and Ubiquitous Computing are briefly discussed; special requirements in the context of Ambient Assisted Living are discussed

    Beyond the Hype: On Using Blockchains in Trust Management for Authentication

    Full text link
    Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage trust in this setting. In recent years, blockchain technology has been introduced as a panacea to our security problems, including that of authentication, without sufficient reasoning, as to its merits.In this work, we investigate the merits of using open distributed ledgers (ODLs), such as the one implemented by blockchain technology, for securing TM systems for authentication. We formally model such systems, and explore how blockchain can help mitigate attacks against them. After formal argumentation, we conclude that in the context of Trust Management for authentication, blockchain technology, and ODLs in general, can offer considerable advantages compared to previous approaches. Our analysis is, to the best of our knowledge, the first to formally model and argue about the security of TM systems for authentication, based on blockchain technology. To achieve this result, we first provide an abstract model for TM systems for authentication. Then, we show how this model can be conceptually encoded in a blockchain, by expressing it as a series of state transitions. As a next step, we examine five prevalent attacks on TM systems, and provide evidence that blockchain-based solutions can be beneficial to the security of such systems, by mitigating, or completely negating such attacks.Comment: A version of this paper was published in IEEE Trustcom. http://ieeexplore.ieee.org/document/8029486

    Secure Interactive Electronic Negotiations in Business to Business Marketplaces

    Get PDF
    In this paper, we discuss security aspects of interactive bilateral multi-attribute negotiations. We introduce this type of electronic negotiations and maintain that it will be an important functional aspect of business-to-business electronic marketplaces. We discuss the general application architecture and the process flow for this type of negotiations. We introduce the relevant security issues and show how these issues can be dealt with, especially within a business relationship where a lower degree of trust prevails. To this purpose, we introduce and discuss a protocol for secure interactive electronic negotiations

    Distributed multimedia systems

    Get PDF
    A distributed multimedia system (DMS) is an integrated communication, computing, and information system that enables the processing, management, delivery, and presentation of synchronized multimedia information with quality-of-service guarantees. Multimedia information may include discrete media data, such as text, data, and images, and continuous media data, such as video and audio. Such a system enhances human communications by exploiting both visual and aural senses and provides the ultimate flexibility in work and entertainment, allowing one to collaborate with remote participants, view movies on demand, access on-line digital libraries from the desktop, and so forth. In this paper, we present a technical survey of a DMS. We give an overview of distributed multimedia systems, examine the fundamental concept of digital media, identify the applications, and survey the important enabling technologies.published_or_final_versio

    Factors Affecting Knowledge Sharing in Virtual Learning Teams (VLTs) in Distance Education

    Get PDF
    This study asserts that knowledge sharing (a component of knowledge management) in distance education virtual learning teams (VLTs) is important for successful collaborative learning and that various factors characterizing person and environment can impact VLT members\u27 knowledge sharing behavior. Factors under the category of person are VLT members\u27 competencies for working on VLTs, and their learning goal orientation and performance goal orientation. Factors under VLT environment are social presence in the VLT, the VLT learning community, satisfaction with the VLT, task type, and instructor strategies. Knowledge sharing is defined as a behavior in which VLT members impart their expertise, insight, or understanding to other members in the VLT or to the entire team, intending for the recipients to have that knowledge in common with themselves, the sharers. The study used Bandura\u27s (1986) model of triadic reciprocal causation as a theoretical framework. The model is suitable for this research because it considers relationships between person, environment, and behavior. First, the study identified variables that are directly related to knowledge sharing. Next, the study validated those constructs. After the constructs had been validated, they were entered into a knowledge sharing measurement model. The study empirically tested a measurement model with five latent variables, taking into account the measurement error. Next, the study cross-validated the model with multiple groups drawn from the same sample. The sample consisted of data from 1,374 participants matriculated in graduate and undergraduate programs at an online university. The data were analyzed using split sample methodology, multiple regression analysis, and structural equation modeling techniques (factor analysis and latent variable structural equation modeling- SEM). The study\u27s findings suggest that there is a direct predictive relationship between knowledge sharing and competencies for working on VLTs, learning environment, social presence, task type, and mediating relationships for learning community, social presence, and task type in the knowledge sharing model. This study contributes to research, theory, and practice. It concludes by presenting a knowledge sharing model that can be reevaluated with distance education student populations at various kinds of distance education institutions

    Proceedings of the 4th Workshop on Interacting with Smart Objects 2015

    Get PDF
    These are the Proceedings of the 4th IUI Workshop on Interacting with Smart Objects. Objects that we use in our everyday life are expanding their restricted interaction capabilities and provide functionalities that go far beyond their original functionality. They feature computing capabilities and are thus able to capture information, process and store it and interact with their environments, turning them into smart objects

    Das MMI-Verbundprojekt am TecO

    Get PDF
    Im Auftrag der DeTeBerkom GmbH Berlin wurde von 1994 bis 1996 das Projekt Mensch-Maschine-Schnittstellen im multimedialen Verwaltungs- buero (MMI) als Verbundprojekt unter Beteiligung des Telecooperation Office durchgefuert. Zielsetzung des Verbundprojektes war die Unter- stuetzung der oeffenlichen Verwaltung im Anwendungsbereich Buerokom- munikation, durch den Einsatz und die Nutzung von Telekooperations- anwendungen. Grundvoraussetzung hierfuer war die Zurverfuegungstel- lung von Anwendungen ueber moeglichst benutzerfreundliche Schnitt- stellen. Das Projekt sollte dabei der Entwicklung, Pilotierung und Bewertung neuer MMI-Verfahren fuer eine Verbesseurng der Oberflae- chengestalltung fuer Telekooperationsanwendungen dienen. Das Tele- cooperation Office war als Partner im Projektverbund fuer Multimoda- litaet in Kommunikationsanwendungen zustaendig. Der vorliegende Bericht stellt das Projekt vor und fasst die erarbeitenden Grundlagen, den Projektverlauf und die Ergebnisse der Arbeiten am TecO zusammen

    Norms for Modeling Agents' Interaction in Ubiquitous Environments

    Get PDF
    • …
    corecore