Abstract
The topics of privacy, security and trust have become high priority topics in the research agenda of pervasive computing. Recent publications have suggested that there is or at least needs to be a relationship of research in these areas with activities in context awareness. The approach of the workshop, on which this proceedings reports, was to investigate the possible interfaces between these different research strands in pervasive computing and to define how their concepts may interoperate. This first article is therefore the introduction and overview of the workshop, providing some background on pervasive computing and its challenges.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ambient Agoras. German Fraunhofer Gesellschaft (FhG), Darmstadt. http://www.ambient-agoras.org/.
Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 164–173, Los Alamitos, USA, May 1996. AT&T.
V. Cahill, E. Gray, J.-M. Seigneur, C. Jensen, Y. Chen, B. Shand, N. Dimmock, A. Twigg, J. Bacon, C. English, W. Wagealla, S. Terzis, P. Nixon, G. Seru-gendo, C. Bryce, M. Carbone, K. Krukow, and M. Nielsen. Using Trust for Secure Collaboration in Uncertain Environments. Pervasive Computing Magazine, 2(3):52–61, 2003.
Anind K. Dey. Understanding and Using Context. Personal and Ubiquitous Computing Journal, 5(l):4–7, 2001.
H. Ishii and B. Ullmer. Tangible Bits: Towards Seamless Interfaces between People, Bits, and Atoms. In Computing Systems (CHI), pages 234–241, 1997.
Lalana Kagal, Jeffrey L Undercoffer, Filip Perich, Anupam Joshi, and Tim Finin. A Security Architecture Based on Trust Management for Pervasive Computing Systems. In Grace Hopper Celebration of Women in Computing, October 2002.
David Kirsh. Adaptive Rooms, Virtual Collaboration, and Cognitive Workflow. In Cooperative Buildings. Integrating Information, Organizations, and Architecture, number 1670 in LNCS. Springer-Verlag, 1999.
Steve Mann. WearComp.org, WearCam.org, UTWCHI, and Steve Mann’s Personal Web Page-research, 2004.
Nexus. University of Stuttgart, Germany. http://nexus.informatik.unistuttgart.de/.
Bruce Schechter. Seeing the light: IBM’s vision of life beyond the PC, 1999.
Smart Spaces. National Institute of Standards and Technology. http://www.nist.gov/smartspace/.
SECURE Project Official Website, http://secure.dsg.cs.tcd.ie, 2002.
Mark Weiser. The Computer for the 21st Century. Scientific American, pages 66–75, September 1991.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
Robinson, P., Vogt, H., Wagealla, W. (2005). Some Research Challenges in Pervasive Computing. In: Robinson, P., Vogt, H., Wagealla, W. (eds) Privacy, Security and Trust within the Context of Pervasive Computing. The International Series in Engineering and Computer Science, vol 780. Springer, Boston, MA. https://doi.org/10.1007/0-387-23462-4_1
Download citation
DOI: https://doi.org/10.1007/0-387-23462-4_1
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23461-8
Online ISBN: 978-0-387-23462-5
eBook Packages: Computer ScienceComputer Science (R0)