108,083 research outputs found

    Trust and Privacy Permissions for an Ambient World

    Get PDF
    Ambient intelligence (AmI) and ubiquitous computing allow us to consider a future where computation is embedded into our daily social lives. This vision raises its own important questions and augments the need to understand how people will trust such systems and at the same time achieve and maintain privacy. As a result, we have recently conducted a wide reaching study of people’s attitudes to potential AmI scenarios with a view to eliciting their privacy concerns. This chapter describes recent research related to privacy and trust with regard to ambient technology. The method used in the study is described and findings discussed

    Freedom of science

    Get PDF
    Purpose – The purpose of this paper is to highlight the importance of "freedom of science"("academic freedom")for the advancement of society and mankind, which, however, is permanently endangered by powerful organisations, groups and individuals, who in pursuit of their one-sided interests are seeking to constrain information about the truth. As a broad term, freedom of science embraces freedom in research, learning, teachingand publication. All of these activities should be dedicated to identifying the truth and learning about the truth. Design/methodology/approach – Three theoretical approaches are of importance for framing issues related to freedom of science, which in this paper are integrated into the framework of mindset agency theory: freedom is a value; "freedom" is claimed by agents who pursue specific interests (goals), which might constrain others; and individuals are agents who are interacting with each other within a social system–cooperation, ignorance or conflict. Findings – Freedom as a value is at the core of intellectual autonomy. Intellectual autonomy is a necessarycondition for innovation and advancement of knowledge. The observable modes of interaction/coexistenceamong researchers are influenced by individual research goals and by the researchers' access to resources, which may be deliberately constrained by opponents or other researchers as competitors. Research limitations/implications – For further research, which is beyond this paper, the authors can refer to: analyses of challenges of "academic freedom" – in terms of ethics, protection of individual humanrights, political pressures and conflicts of interests; the issues of truth, i.e. the impact of fake news andcreation of "alternate facts"; and the relation between academic freedom and employment (academic tenure) inpresent-day societies. Owing to lack of space, this paper cannot deal with the danger emerging from powerful organisations or powerful individuals, who are challenging freedom of science. Social implications–If there is no freedom of science then social progress is constrained. If there is no access to right data, decisions will be wrong. Originality/value – So far, a comprehensive cybernetic model was not published, which supports systems thinking about scholars and teachers (inter)acting in research organisations

    Creating agent platforms to host agent-mediated services that share resources

    Get PDF
    After a period where the Internet was exclusively filled with content, the present efforts are moving towards services, which handle the raw information to create value from it. Therefore labors to create a wide collection of agent-based services are being perfomed in several projects, such as Agentcities does. In this work we present an architecture for agent platforms named a-Buildings. The aim of the proposed architecture is to ease the creation, installation, search and management of agent-mediated services and the share of resources among services. To do so the a-Buildings architecture creates a new level of abstraction on top of the standard FIPA agent platform specification. Basically, an a-Building is a service-oriented platform which offers a set of low level services to the agents it hosts. We define low level services as those required services that are neccesary to create more complex high level composed services.Postprint (published version

    Towards trusted volunteer grid environments

    Full text link
    Intensive experiences show and confirm that grid environments can be considered as the most promising way to solve several kinds of problems relating either to cooperative work especially where involved collaborators are dispersed geographically or to some very greedy applications which require enough power of computing or/and storage. Such environments can be classified into two categories; first, dedicated grids where the federated computers are solely devoted to a specific work through its end. Second, Volunteer grids where federated computers are not completely devoted to a specific work but instead they can be randomly and intermittently used, at the same time, for any other purpose or they can be connected or disconnected at will by their owners without any prior notification. Each category of grids includes surely several advantages and disadvantages; nevertheless, we think that volunteer grids are very promising and more convenient especially to build a general multipurpose distributed scalable environment. Unfortunately, the big challenge of such environments is, however, security and trust. Indeed, owing to the fact that every federated computer in such an environment can randomly be used at the same time by several users or can be disconnected suddenly, several security problems will automatically arise. In this paper, we propose a novel solution based on identity federation, agent technology and the dynamic enforcement of access control policies that lead to the design and implementation of trusted volunteer grid environments.Comment: 9 Pages, IJCNC Journal 201

    Trust on the Web: Some Web Science Research Challenges

    No full text
    Web Science is the interdisciplinary study of the World Wide Web as a first-order object in order to understand its relationship with the wider societies in which it is embedded, and in order to facilitate its future engineering as a beneficial object. In this paper, research issues and challenges relating to the vital topic of trust are reviewed, showing how the Web Science agenda requires trust to be addressed, and how addressing the challenges requires a range of disciplinary skills applied in an integrated manner

    Security in Pervasive Computing: Current Status and Open Issues

    Get PDF
    Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility. Thousands of pervasive devices are able to arbitrarily join and leave a network, creating a nomadic environment known as a pervasive ad hoc network. However, mobile devices have vulnerabilities, and some are proving to be challenging. Security in pervasive computing is the most critical challenge. Security is needed to ensure exact and accurate confidentiality, integrity, authentication, and access control, to name a few. Security for mobile devices, though still in its infancy, has drawn the attention of various researchers. As pervasive devices become incorporated in our day-to-day lives, security will increasingly becoming a common concern for all users - - though for most it will be an afterthought, like many other computing functions. The usability and expansion of pervasive computing applications depends greatly on the security and reliability provided by the applications. At this critical juncture, security research is growing. This paper examines the recent trends and forward thinking investigation in several fields of security, along with a brief history of previous accomplishments in the corresponding areas. Some open issues have been discussed for further investigation
    corecore