50,126 research outputs found
Proceedings 8th International Workshop on Security Issues in Concurrency (SecCo, Paris, France, August 30, 2010)
This volume contains the proceedings of the 8th Workshop on Security Issues in Concurrency (SecCo 2010). The workshop was held in Paris, France on August 30th, 2010, as a satellite workshop of CONCUR'10. The aim of the SecCo workshop series is to cover the gap between the security and the concurrency communities. More precisely, the workshop promotes the exchange of ideas, trying to focus on common interests and stimulating discussions on central research questions. In particular, we called for papers dealing with security issues (such as authentication, integrity, privacy, confidentiality, access control, denial of service, service availability, safety aspects, fault tolerance, trust, language-based security, probabilistic and information theoretic models) in emerging fields like web services, mobile ad-hoc networks, agent-based infrastructures, peer-to-peer systems, context-aware computing, global/ubiquitous/pervasive computing
Impact of Mobile and Wireless Technology on Healthcare Delivery services
Modern healthcare delivery services embrace the use of leading edge technologies and new
scientific discoveries to enable better cures for diseases and better means to enable early
detection of most life-threatening diseases. The healthcare industry is finding itself in a
state of turbulence and flux. The major innovations lie with the use of information
technologies and particularly, the adoption of mobile and wireless applications in
healthcare delivery [1]. Wireless devices are becoming increasingly popular across the
healthcare field, enabling caregivers to review patient records and test results, enter
diagnosis information during patient visits and consult drug formularies, all without the
need for a wired network connection [2]. A pioneering medical-grade, wireless
infrastructure supports complete mobility throughout the full continuum of healthcare
delivery. It facilitates the accurate collection and the immediate dissemination of patient
information to physicians and other healthcare care professionals at the time of clinical
decision-making, thereby ensuring timely, safe, and effective patient care. This paper
investigates the wireless technologies that can be used for medical applications, and the
effectiveness of such wireless solutions in a healthcare environment. It discusses challenges
encountered; and concludes by providing recommendations on policies and standards for
the use of such technologies within hospitals
Pervasive computing at tableside : a wireless web-based ordering system
Purpose – The purpose of this paper is to introduce a wireless web-based ordering system called iMenu in the restaurant industry. Design/methodology/approach – By using wireless devices such as personal digital assistants and WebPads, this system realizes the paradigm of pervasive computing at tableside. Detailed system requirements, design, implementation and evaluation of iMenu are presented.Findings – The evaluation of iMenu shows it explicitly increases productivity of restaurant staff. It also has other desirable features such as integration, interoperation and scalability. Compared to traditional restaurant ordering process, by using this system customers get faster and better services, restaurant staff cooperate more efficiently with less working mistakes, and enterprise owners thus receive more business profits. Originality/value – While many researchers have explored using wireless web-based information systems in different industries, this paper presents a system that employs wireless multi-tiered web-based architecture to build pervasive computing systems. Instead of discussing theoretical issues on pervasive computing, we focus on practical issues of developing a real system, such as choosing of web-based architecture, design of input methods in small screens, and response time in wireless web-based systems.<br /
Context Aware Adaptable Applications - A global approach
Actual applications (mostly component based) requirements cannot be expressed without a ubiquitous and mobile part for end-users as well as for M2M applications (Machine to Machine). Such an evolution implies context management in order to evaluate the consequences of the mobility and corresponding mechanisms to adapt or to be adapted to the new environment. Applications are then qualified as context aware applications. This first part of this paper presents an overview of context and its management by application adaptation. This part starts by a definition and proposes a model for the context. It also presents various techniques to adapt applications to the context: from self-adaptation to supervised approached. The second part is an overview of architectures for adaptable applications. It focuses on platforms based solutions and shows information flows between application, platform and context. Finally it makes a synthesis proposition with a platform for adaptable context-aware applications called Kalimucho. Then we present implementations tools for software components and a dataflow models in order to implement the Kalimucho platform
Architecture and Implementation of a Trust Model for Pervasive Applications
Collaborative effort to share resources is a significant feature of pervasive computing environments. To achieve secure service discovery and sharing, and to distinguish between malevolent and benevolent entities, trust models must be defined. It is critical to estimate a device\u27s initial trust value because of the transient nature of pervasive smart space; however, most of the prior research work on trust models for pervasive applications used the notion of constant initial trust assignment. In this paper, we design and implement a trust model called DIRT. We categorize services in different security levels and depending on the service requester\u27s context information, we calculate the initial trust value. Our trust value is assigned for each device and for each service. Our overall trust estimation for a service depends on the recommendations of the neighbouring devices, inference from other service-trust values for that device, and direct trust experience. We provide an extensive survey of related work, and we demonstrate the distinguishing features of our proposed model with respect to the existing models. We implement a healthcare-monitoring application and a location-based service prototype over DIRT. We also provide a performance analysis of the model with respect to some of its important characteristics tested in various scenarios
- …