• Title/Summary/Keyword: User 유비쿼터스 컴퓨팅

Search Result 260, Processing Time 0.026 seconds

Design of Anonymity-Preserving User Authentication and Key Agreement Protocol in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서의 익명성을 보장하는 사용자 인증 및 키 동의 프로토콜 설계)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.3-12
    • /
    • 2006
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'smart space' augmented with intelligence and enhanced with services. However, unless privacy concerns are taken into account early in the design process of various ubiquitous devices(e.g. mobile devices, PDAs, sensors, etc.). we will end up crating ubiquitous surveillance infrastructure. Also, it may inappropriate to use public key techniques for computational constrained devices in ubiquitous computing environment. In this paper, we propose efficient user authentication and ky agreement protocol not only to preserve anonymity for protecting personal privacy but also to be suitable for computational constrained devices in ubiquitous computing environments.

Personal Kiosk : A Mobile Service Model for Ubiquitous Computing Environment (Personal Kiosk : 유비쿼터스 컴퓨팅 환경을 위한 모바일 서비스 모델)

  • Park Jeong-Kyu;Seo Seung-Ho;Kim Yang-Nam;Lee Keung-Hae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.3
    • /
    • pp.170-182
    • /
    • 2006
  • Last few years have seen a rapid increase in research on ubiquitous computing. Ubiquitous computing is often touted as a technology that will make computing available to the user anywhere and anytime. One important problem to be addressed in building such a ubiquitous computing environment is how to manage services and deliver them to the user in an effective manner. This paper presents our model called Personal Kiosk(PK) as a way of solving the problem. PK is a model of ubiquitous service provisioning that enables the user to use desired services anytime and anywhere. The design and implementation of the current PK in the 'Local Area' setting with related technical issues are also presented. A location-sensing technique for indoor users and a personalized service provisioning based on user location and privileges are discussed in detail.

Intelligent Service Agents using User Profile and Ontology (온톨로지와 사용자 프로파일을 적용한 지능형 서비스 에이전트)

  • Kim, Je-Min;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.12
    • /
    • pp.1062-1072
    • /
    • 2006
  • Recently, new intelligent service frameworks, such as ubiquitous computing are proposed. So, the necessity of adaptive agent system has been increased. In this paper, we propose an intelligent service agent to help that ubiquitous computing system offer user suitable service in ubiquitous computing environment. In order to offer user suitable uT-service, an intelligent service agent mediates the gap between the context information in uT-service system, and user preference is reflected in it. Therefore, we focus on following three components; the first is suitable multi agent framework-agent communication analysis and applicable method of inference engine, the second is uT-ontologies to describe various context information-context information sharing between agents and context information understanding between agents, the third is learning method of user profile to apply in uT-service system. This approach enables us to build adaptive uT-service system to offer suitable service according to user preference.

Developing a User-Perceived Value Framework for Ubiquitous Computing (유비쿼터스 컴퓨팅에 관한 사용자 가치구조 연구)

  • Lee, Jung-Woo;Lee, Bong-Gyou;Park, Jae-Sung
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • In this study, a value framework for ubiquitous computing is developed and presented. Using 'value focused thinking' approach suggested by Keeney, twenty-two potential users of ubiquitous computing were interviewed and 435 statements were obtained from these interviews. Subsequent purification and redundancy removal process reduces these 435 statements into 166 objectives users have in their mind when thinking about ubiquitous computing. These 166 objectives were again simplified into 37 objectives by clustering. Through a focus group interview, these objectives were again classified into a means-ends network diagram by analyzing reciprocal relationships among them. Resulting means-ends network reveals the value framework inherent within the perception of users. This framework will be useful as a reference in developing new business models in ubiquitous computing as well as developing technologies themselves.

  • PDF

Authentication for Single/Multiple Domain using Attribute Certificates (유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일/멀티 도메인 인증)

  • Lee Deok-Gyu;Park Hee-Un;Lee In-Yeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.291-300
    • /
    • 2005
  • The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

Design of U-School Framework Based on User-Centric Scenario (사용자 중심 시나리오에 따른 U-스풀 프레임워크 설계)

  • Hong, Myoung-Woo;Cho, Dae-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.283-291
    • /
    • 2007
  • In the age of ubiquitous computing, computer systems will be seamlessly integrated into our everyday life, providing services and information to us in an anywhere, anytime fashion. This ubiquitous computing can be used for developing a ubiquitous learning (U-learning). In this paper, we present a framework for U-school in which ubiquitous computing technologies are applied to advance the existing ERSS (Korea's Educational Resources Sharing System). Our framework applies mobile, sensor, and context-aware technologies to the existing ERSS. This framework presents a user-centric learning environment, using user-centric scenario. The U-school with context-aware services therefore can lead to the just-in-time learning or learner-led learning based on dynamic contexts acquired from learners, teachers and computing entities.

Usability Evaluation Framework for Ubiquitous Computing Device (유비쿼터스 디바이스를 위한 사용성 평가 프레임워크 개발 - 디바이스의 Graphical User Interface 중심으로)

  • Kim, Han-Joon;Choi, Jong-Kyu;Ji, Yong-Gu
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.131-135
    • /
    • 2008
  • Nowadays various information devices using electronic technology has been released. And these digital devices will be continuously developed to make a satisfaction of customer's needs. So digital device will support network service using communication technology, so users will use the internet service anywhere, anytime. Also the networked device which is used in ubiquitous computing environment should be evaluated by new evaluation framework. Therefore previous usability evaluation framework need to reflect the characteristics of ubiquitous computing. However most of pervious research about ubiquitous computing was about conceptual issues like rules and characteristics of ubiquitous computing, so the research of usability testing and evaluation method for ubiquitous computing is rarely conducted. This research's purpose is developing the evaluation framework for ubiquitous computing device and usability model for ubiquitous computing. To develop the evaluation framework, we collect the evaluation indexes which have need used in GUI evaluation And we extract evaluation indexes for ubiquitous computing based on literature review.

  • PDF

An Anonymity-Preserving User Authentication and Authorization Model for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.25-32
    • /
    • 2005
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'Smart space' augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack of proper authentication and authorization techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environments. In this Paper, we propose efficient user authentication and authorization model with anonymity for the privacy-preserving for ubiquitous computing environments. Our model is suitable for distributed environments with the computational constrained devices by using MAC-based anonymous certificate and security association token instead of using Public key encryption technique. And our Proposed Protocol is better than Kerberos system in sense of cryptographic computation processing.

Ubiquitous Computing & Network Security Analysis (유비쿼터스 컴퓨팅 & 트워크 보안분석)

  • 정상일;송원덕;이원찬;윤동식
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.35-42
    • /
    • 2004
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this situation we must analytics that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.struction.

  • PDF

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF