Abstract
Ubiquitous computing requires new paradigms to assist users organizing and performing daily tasks. Supporting autonomy and providing secured execution environments are two among a lot of challenging issues. Next generation smart cards, so-called smart devices, are regarded as personal devices providing a secured execution and storage environment for application tasks and sensitive privacy information, respectively. Hardware evolution of smart devices enables them to provide capacity to host personal agents, implemented as mobile agents. Mobile agents perform essential tasks such as service negotiation in order to enable automated dynamic service delivery. This paper presents our middleware and a service delivery pattern for user-centric service provisioning by applying mobile agents to smart devices. We further discuss how the middleware platform can be integrated with a security framework for a federation of mobile agents, where a smart device is used as a central trusted entity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Weiser, M.: The Computer for the 21st Century. Scientific American (September 1991)
Mattern, F., Sturm, P.: From Distributed Systems to Ubiquitous Computing. In: Fachtagung Kommunikation in verteilten Systemen (KIVS), Leipzig. Springer, Heidelberg (February 2003)
Capra, L., Emmerich, W., Mascolo, C.: Middleware for Mobile Computing. Wireless Personal Communications (2002)
EU IST Project: LEAP, http://leap.crm-paris.com
emporphia Ltd.: FIPA-OS, http://www.emorphia.com/research/about.htm
Telecom Italia Lab: JADE, http://jade.cselt.it
Project JXTA: JXTA, http://www.jxta.org
Steglich, S.S., et al.: I-Centric Services Based on Super Distributed Objects. In: ISADS 2003 The Sixth International Symposium (April 2003)
Moore, G.: Cramming more components onto integrated circuits. IEEE Electronics 38 (April 1965)
International Standards Organization: Information technology – Open Systems Interconnection – Basic Reference Model: The Basic Model. ISO/IEC 7498-1 (1994)
WWRF. Wireless World Research Forum WG2: Service Infrastructure of the Wireless World, http://www.wireless-world-research.org/
Noda, C., Strick, L., Honjo, H., et al.: Distributed Middleware for User Centric System. In: WWRF#9 conference, Zurich (July 2003)
Bartolini, C., Preist, C., Jennings, N.: A Generic Software Framework for Automated Negotiation. In: AAMAS 2002, Bologna, Italy (July 2002)
IKV++ Technologies AG: enago Mobile Agent Platform, http://www.ikv.de/content/Produkte/enago_mobile.htm
IKV++ Technologies AG: Grasshopper Agent Platform, http://www.grasshopper.de
IBM: WebSphere Studio Device Developer, http://www-306.ibm.com/software/wireless/wsdd/
Smith, M., Welty, C., McGuinness, D.: OWL Web Ontology Language Guide, http://www.w3.org/TR/owl-guide/
Stallings, W.: Cryptography and Network Security. In: Principles and Practice. Prentice-Hall, Englewood Cliffs (1999)
Walter, T., Bussard, L., Robinson, P., Roudier, Y.: Security and trust issues in ubiquitous environments - The business-to-employee dimension. In: SAINT 2004 Symposium on Application and the Internet, Tokyo (January 2004)
Smith, R.E.: Authentication from passwords to public keys. Addison-Wesley, Reading (2002)
WiTness consortium: WiTness. Wireless Trust for Mobile Business (2004), http://www.wireless-trust.org
Garfinkel, S.: PGP Pretty Good Privacy. O.Reilly (1995)
Cahill, V., Gray, E., et al.: Using Trust for Secure Collaboration in Uncertain Environments. Pervasive Computing (July-September 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Noda, C., Walter, T. (2005). Smart Devices for Next Generation Mobile Services. In: Barthe, G., Burdy, L., Huisman, M., Lanet, JL., Muntean, T. (eds) Construction and Analysis of Safe, Secure, and Interoperable Smart Devices. CASSIS 2004. Lecture Notes in Computer Science, vol 3362. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30569-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-30569-9_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24287-1
Online ISBN: 978-3-540-30569-9
eBook Packages: Computer ScienceComputer Science (R0)