Skip to main content

Some Research Challenges in Pervasive Computing

  • Chapter

Part of the book series: The International Series in Engineering and Computer Science ((SECS,volume 780))

Abstract

The topics of privacy, security and trust have become high priority topics in the research agenda of pervasive computing. Recent publications have suggested that there is or at least needs to be a relationship of research in these areas with activities in context awareness. The approach of the workshop, on which this proceedings reports, was to investigate the possible interfaces between these different research strands in pervasive computing and to define how their concepts may interoperate. This first article is therefore the introduction and overview of the workshop, providing some background on pervasive computing and its challenges.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ambient Agoras. German Fraunhofer Gesellschaft (FhG), Darmstadt. http://www.ambient-agoras.org/.

    Google Scholar 

  2. Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 164–173, Los Alamitos, USA, May 1996. AT&T.

    Google Scholar 

  3. V. Cahill, E. Gray, J.-M. Seigneur, C. Jensen, Y. Chen, B. Shand, N. Dimmock, A. Twigg, J. Bacon, C. English, W. Wagealla, S. Terzis, P. Nixon, G. Seru-gendo, C. Bryce, M. Carbone, K. Krukow, and M. Nielsen. Using Trust for Secure Collaboration in Uncertain Environments. Pervasive Computing Magazine, 2(3):52–61, 2003.

    Article  Google Scholar 

  4. Anind K. Dey. Understanding and Using Context. Personal and Ubiquitous Computing Journal, 5(l):4–7, 2001.

    Article  Google Scholar 

  5. H. Ishii and B. Ullmer. Tangible Bits: Towards Seamless Interfaces between People, Bits, and Atoms. In Computing Systems (CHI), pages 234–241, 1997.

    Google Scholar 

  6. Lalana Kagal, Jeffrey L Undercoffer, Filip Perich, Anupam Joshi, and Tim Finin. A Security Architecture Based on Trust Management for Pervasive Computing Systems. In Grace Hopper Celebration of Women in Computing, October 2002.

    Google Scholar 

  7. David Kirsh. Adaptive Rooms, Virtual Collaboration, and Cognitive Workflow. In Cooperative Buildings. Integrating Information, Organizations, and Architecture, number 1670 in LNCS. Springer-Verlag, 1999.

    Google Scholar 

  8. Steve Mann. WearComp.org, WearCam.org, UTWCHI, and Steve Mann’s Personal Web Page-research, 2004.

    Google Scholar 

  9. Nexus. University of Stuttgart, Germany. http://nexus.informatik.unistuttgart.de/.

    Google Scholar 

  10. Bruce Schechter. Seeing the light: IBM’s vision of life beyond the PC, 1999.

    Google Scholar 

  11. Smart Spaces. National Institute of Standards and Technology. http://www.nist.gov/smartspace/.

    Google Scholar 

  12. SECURE Project Official Website, http://secure.dsg.cs.tcd.ie, 2002.

    Google Scholar 

  13. Mark Weiser. The Computer for the 21st Century. Scientific American, pages 66–75, September 1991.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

Robinson, P., Vogt, H., Wagealla, W. (2005). Some Research Challenges in Pervasive Computing. In: Robinson, P., Vogt, H., Wagealla, W. (eds) Privacy, Security and Trust within the Context of Pervasive Computing. The International Series in Engineering and Computer Science, vol 780. Springer, Boston, MA. https://doi.org/10.1007/0-387-23462-4_1

Download citation

  • DOI: https://doi.org/10.1007/0-387-23462-4_1

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-23461-8

  • Online ISBN: 978-0-387-23462-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics