108,083 research outputs found
Trust and Privacy Permissions for an Ambient World
Ambient intelligence (AmI) and ubiquitous computing allow us to consider a future where computation is embedded into our daily social lives. This vision raises its own important questions and augments the need to understand how people will trust such systems and at the same time achieve and maintain privacy. As a result, we have recently conducted a wide reaching study of people’s attitudes to potential AmI scenarios with a view to eliciting their privacy concerns. This chapter describes recent research related to privacy and trust with regard to ambient technology. The method used in the study is described and findings discussed
Freedom of science
Purpose – The purpose of this paper is to highlight the importance of "freedom of science"("academic freedom")for the advancement of society and mankind, which, however, is permanently endangered by powerful organisations, groups and individuals, who in pursuit of their one-sided interests are seeking to constrain information about the truth. As a broad term, freedom of science embraces freedom in research, learning, teachingand publication. All of these activities should be dedicated to identifying the truth and learning about the truth. Design/methodology/approach – Three theoretical approaches are of importance for framing issues related to freedom of science, which in this paper are integrated into the framework of mindset agency theory: freedom is a value; "freedom" is claimed by agents who pursue specific interests (goals), which might constrain others; and individuals are agents who are interacting with each other within a social system–cooperation, ignorance or conflict. Findings – Freedom as a value is at the core of intellectual autonomy. Intellectual autonomy is a necessarycondition for innovation and advancement of knowledge. The observable modes of interaction/coexistenceamong researchers are influenced by individual research goals and by the researchers' access to resources, which may be deliberately constrained by opponents or other researchers as competitors. Research limitations/implications – For further research, which is beyond this paper, the authors can refer to: analyses of challenges of "academic freedom" – in terms of ethics, protection of individual humanrights, political pressures and conflicts of interests; the issues of truth, i.e. the impact of fake news andcreation of "alternate facts"; and the relation between academic freedom and employment (academic tenure) inpresent-day societies. Owing to lack of space, this paper cannot deal with the danger emerging from powerful organisations or powerful individuals, who are challenging freedom of science. Social implications–If there is no freedom of science then social progress is constrained. If there is no access to right data, decisions will be wrong. Originality/value – So far, a comprehensive cybernetic model was not published, which supports systems thinking about scholars and teachers (inter)acting in research organisations
Creating agent platforms to host agent-mediated services that share resources
After a period where the Internet was exclusively filled with content,
the present
efforts are moving towards services, which handle the raw information to
create
value from it. Therefore labors to create a wide collection of
agent-based services
are being perfomed in several projects, such as Agentcities does.
In this work we present an architecture for agent platforms named
a-Buildings. The
aim of the proposed architecture is to ease the creation, installation,
search and
management of agent-mediated services and the share of resources among
services.
To do so the a-Buildings architecture creates a new level of abstraction
on top of
the standard FIPA agent platform specification.
Basically, an a-Building is a service-oriented platform which offers a
set of
low level services to the agents it hosts. We define low level services
as those
required services that are neccesary to create more complex high level
composed
services.Postprint (published version
Towards trusted volunteer grid environments
Intensive experiences show and confirm that grid environments can be
considered as the most promising way to solve several kinds of problems
relating either to cooperative work especially where involved collaborators are
dispersed geographically or to some very greedy applications which require
enough power of computing or/and storage. Such environments can be classified
into two categories; first, dedicated grids where the federated computers are
solely devoted to a specific work through its end. Second, Volunteer grids
where federated computers are not completely devoted to a specific work but
instead they can be randomly and intermittently used, at the same time, for any
other purpose or they can be connected or disconnected at will by their owners
without any prior notification. Each category of grids includes surely several
advantages and disadvantages; nevertheless, we think that volunteer grids are
very promising and more convenient especially to build a general multipurpose
distributed scalable environment. Unfortunately, the big challenge of such
environments is, however, security and trust. Indeed, owing to the fact that
every federated computer in such an environment can randomly be used at the
same time by several users or can be disconnected suddenly, several security
problems will automatically arise. In this paper, we propose a novel solution
based on identity federation, agent technology and the dynamic enforcement of
access control policies that lead to the design and implementation of trusted
volunteer grid environments.Comment: 9 Pages, IJCNC Journal 201
Trust on the Web: Some Web Science Research Challenges
Web Science is the interdisciplinary study of the World Wide Web as a first-order object in order to understand its relationship with the wider societies in which it is embedded, and in order to facilitate its future engineering as a beneficial object. In this paper, research issues and challenges relating to the vital topic of trust are reviewed, showing how the Web Science agenda requires trust to be addressed, and how addressing the challenges requires a range of disciplinary skills applied in an integrated manner
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility. Thousands of pervasive devices are able to arbitrarily join and leave a network, creating a nomadic environment known as a pervasive ad hoc network. However, mobile devices have vulnerabilities, and some are proving to be challenging. Security in pervasive computing is the most critical challenge. Security is needed to ensure exact and accurate confidentiality, integrity, authentication, and access control, to name a few. Security for mobile devices, though still in its infancy, has drawn the attention of various researchers. As pervasive devices become incorporated in our day-to-day lives, security will increasingly becoming a common concern for all users - - though for most it will be an afterthought, like many other computing functions. The usability and expansion of pervasive computing applications depends greatly on the security and reliability provided by the applications. At this critical juncture, security research is growing. This paper examines the recent trends and forward thinking investigation in several fields of security, along with a brief history of previous accomplishments in the corresponding areas. Some open issues have been discussed for further investigation
- …