Skip to main content

Ubisafe Computing: Vision and Challenges (I)

  • Conference paper
Autonomic and Trusted Computing (ATC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4158))

Included in the following conference series:

Abstract

In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people sometime, somewhere; a few of them can even gratify some of the people anytime, anywhere. However, at present, none of the computing paradigms intend to gratify all the people anytime, anywhere. With the rapid advance of information technology and the spread of information services, the IT disparity in age, social standing, and race of the people has been expanding and has become a critical social problem of the 21st century. Thus, we have a fundamental question: Can we construct, in a unified methodology, a computing environment that can gratify all the people in all situations, all places and all the time? We propose a novel and inclusive computing paradigm, named ubisafe computing, for studying and providing possible solutions to the above problem. The ultimate goal of ubisafe computing is to build a computing environment in which all people and organizations can benefit from ubiquitous services anytime anywhere with assured and desired satisfaction without worrying or thinking about safety. That is, the ubisafe computing vision emphasizes two basic aspects: ubiquitous safety and ubiquitous satisfaction to all people in all situations. This paper presents the motivations for the ubisafe computing vision but focuses on one basic aspect of ubiquitous safety that covers reliability, security, privacy, persistency, trust, risk, out of control, and other watchfulness while considering novel, essential ubicomp or percomp features of unobtrusive computers, diverse users/people and life-like systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser, M.: The Computer for the Twenty-First Century. Scientific American, 94–104 (September 1991)

    Google Scholar 

  2. Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. IEEE Personal Communication, 10–17 (August 2001)

    Google Scholar 

  3. The European Union Report on AmI: Scenarios for Ambient Intelligence in 2010 (2001), ftp://ftp.cordis.lu/pub/ist/docs/istagscenarios2010.pdf

  4. Shchilit, B.N., Adams, N., Want, R.: Context Aware Computing Applications. In: Proc. of Workshop on Mobile Computing, Systems and Applications, CA (December 1994)

    Google Scholar 

  5. Yau, S., Karim, F., Wang, Y., Wang, B., Gupta, S.K.S.: Reconfigurable Context-Sensitive Middleware for Pervasive Computing. IEEE Pervasive Computing 1(3), 33–40 (2002)

    Article  Google Scholar 

  6. Addlesee, M., Curwen, R.W., Hodges, S., Newman, J., Steggles, P., Ward, A., Hopper, A.: Implementing a Sentient Computing System. IEEE Computer 34(8), 50–56 (2001)

    Google Scholar 

  7. Tennenhouse, D.L.: Proactive Computing. Communications of ACM 43(5), 43–50 (2000)

    Article  Google Scholar 

  8. Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. IEEE Computer 36(1), 41–50 (2003)

    Google Scholar 

  9. Abelson, H., Allen, D., Coore, D., Hanson, C., Rauch, E., Sussman, G.H., Weiss, R.: Amorphous Computing. Communications of the ACM 43(5), 74–82 (2000)

    Article  Google Scholar 

  10. Mamei, M., Zambonelli, F.: Spray Computers: Frontiers of Self-organization for Pervasive Computing. In: 3rd Italian Workshop From Objects to Agents (September 2003)

    Google Scholar 

  11. Müller-Schloer, C.: Organic Computing – On the Feasibility of Controlled Emergence. In: Proceedings of CODES + ISSS, pp. 2–5. ACM Press, New York (2004)

    Google Scholar 

  12. Cheng, J.: Persistent Computing Systems as Continuously Available, Reliable, and Secure Systems. In: Proceedings of 1st International Conference on Availability, Reliability and Security, pp. 631–638. IEEE Computer Society Press, Los Alamitos (2006)

    Chapter  Google Scholar 

  13. Ma, J.: Smart u-Things – Challenging Real World Complexity. IPSJ Symposium Series (19), 146–150 (2005)

    Google Scholar 

  14. Mundie, C., de Vries, P., Haynes, P., Corwine, M.: Trustworthy Computing (2002), http://www.microsoft.com/mscorp/twc/twc_whitepaper.mspx

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ma, J. et al. (2006). Ubisafe Computing: Vision and Challenges (I). In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds) Autonomic and Trusted Computing. ATC 2006. Lecture Notes in Computer Science, vol 4158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11839569_37

Download citation

  • DOI: https://doi.org/10.1007/11839569_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38619-3

  • Online ISBN: 978-3-540-38622-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics