Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3362))

Abstract

Ubiquitous computing requires new paradigms to assist users organizing and performing daily tasks. Supporting autonomy and providing secured execution environments are two among a lot of challenging issues. Next generation smart cards, so-called smart devices, are regarded as personal devices providing a secured execution and storage environment for application tasks and sensitive privacy information, respectively. Hardware evolution of smart devices enables them to provide capacity to host personal agents, implemented as mobile agents. Mobile agents perform essential tasks such as service negotiation in order to enable automated dynamic service delivery. This paper presents our middleware and a service delivery pattern for user-centric service provisioning by applying mobile agents to smart devices. We further discuss how the middleware platform can be integrated with a security framework for a federation of mobile agents, where a smart device is used as a central trusted entity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser, M.: The Computer for the 21st Century. Scientific American (September 1991)

    Google Scholar 

  2. Mattern, F., Sturm, P.: From Distributed Systems to Ubiquitous Computing. In: Fachtagung Kommunikation in verteilten Systemen (KIVS), Leipzig. Springer, Heidelberg (February 2003)

    Google Scholar 

  3. Capra, L., Emmerich, W., Mascolo, C.: Middleware for Mobile Computing. Wireless Personal Communications (2002)

    Google Scholar 

  4. EU IST Project: LEAP, http://leap.crm-paris.com

  5. emporphia Ltd.: FIPA-OS, http://www.emorphia.com/research/about.htm

  6. Telecom Italia Lab: JADE, http://jade.cselt.it

  7. Project JXTA: JXTA, http://www.jxta.org

  8. Steglich, S.S., et al.: I-Centric Services Based on Super Distributed Objects. In: ISADS 2003 The Sixth International Symposium (April 2003)

    Google Scholar 

  9. Moore, G.: Cramming more components onto integrated circuits. IEEE Electronics 38 (April 1965)

    Google Scholar 

  10. International Standards Organization: Information technology – Open Systems Interconnection – Basic Reference Model: The Basic Model. ISO/IEC 7498-1 (1994)

    Google Scholar 

  11. WWRF. Wireless World Research Forum WG2: Service Infrastructure of the Wireless World, http://www.wireless-world-research.org/

  12. Noda, C., Strick, L., Honjo, H., et al.: Distributed Middleware for User Centric System. In: WWRF#9 conference, Zurich (July 2003)

    Google Scholar 

  13. Bartolini, C., Preist, C., Jennings, N.: A Generic Software Framework for Automated Negotiation. In: AAMAS 2002, Bologna, Italy (July 2002)

    Google Scholar 

  14. IKV++ Technologies AG: enago Mobile Agent Platform, http://www.ikv.de/content/Produkte/enago_mobile.htm

  15. IKV++ Technologies AG: Grasshopper Agent Platform, http://www.grasshopper.de

  16. IBM: WebSphere Studio Device Developer, http://www-306.ibm.com/software/wireless/wsdd/

  17. Smith, M., Welty, C., McGuinness, D.: OWL Web Ontology Language Guide, http://www.w3.org/TR/owl-guide/

  18. Stallings, W.: Cryptography and Network Security. In: Principles and Practice. Prentice-Hall, Englewood Cliffs (1999)

    Google Scholar 

  19. Walter, T., Bussard, L., Robinson, P., Roudier, Y.: Security and trust issues in ubiquitous environments - The business-to-employee dimension. In: SAINT 2004 Symposium on Application and the Internet, Tokyo (January 2004)

    Google Scholar 

  20. Smith, R.E.: Authentication from passwords to public keys. Addison-Wesley, Reading (2002)

    Google Scholar 

  21. WiTness consortium: WiTness. Wireless Trust for Mobile Business (2004), http://www.wireless-trust.org

  22. Garfinkel, S.: PGP Pretty Good Privacy. O.Reilly (1995)

    Google Scholar 

  23. Cahill, V., Gray, E., et al.: Using Trust for Secure Collaboration in Uncertain Environments. Pervasive Computing (July-September 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Noda, C., Walter, T. (2005). Smart Devices for Next Generation Mobile Services. In: Barthe, G., Burdy, L., Huisman, M., Lanet, JL., Muntean, T. (eds) Construction and Analysis of Safe, Secure, and Interoperable Smart Devices. CASSIS 2004. Lecture Notes in Computer Science, vol 3362. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30569-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30569-9_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24287-1

  • Online ISBN: 978-3-540-30569-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics