User-Centric Networking


Book Description

This work represents a milestone for the "ULOOP User-centric Wireless Local Loop" project funded by the EU IST Seventh Framework Programme. ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures. Throughout the last 3 years, ULOOP has developed enabling technologies for user-centricity in wireless networks, with particular emphasis on social trust management, cooperation incentives, community building, mobility estimation, and resource management. This work will be of interest to researchers, policymakers, operators, vendors, and end-users interested in the current and future directions of user-centric access networks.




User-Centric and Information-Centric Networking and Services


Book Description

User-Centric Networks (UCN) and Information-Centric Networks (ICN) are new communication paradigms to increase the efficiency of content delivery and also content availability. In this new concept, the network infrastructure actively contributes to content caching and distribution. This book presents the basic concepts of UCN and ICN, describes the main architecture proposals for these networks, and discusses the main challenges to their development. The book also looks at the current challenges for this concept, including naming, routing and caching on the network-core elements, several aspects of content security, user privacy, and practical issues in implementing UCN and ICN.




User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks


Book Description

The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) due to a dramatic increase in identity theft. The problem is even greater in service-oriented architectures, where partial identities are sprinkled across many services and users have no control over such identities. This book provides a review of some issues of contextual computing, its implications and usage within pervasive environments. The book will also introduce the concept of Security of Systems-of-Systems (SoS) Composition and its security implications within the domain of ubiquitous computing and Crisis Management in large scale disaster recovery situations and scenarios. To tackle the above problems, the book will emphasise the fact that it is essential to allow users to have full control over their own identities in MANet environments. So far, the development of such identity control remains a significant challenge for the research community. The main focus of this book is on the area of identity management in MANets and emergency situations by using context-awareness and user-centricity together with its security issues and implications. Context-awareness allows us to make use of partial identities as a way of user identity protection and node identification. User-centricity is aimed at putting users in control of their partial identities, policies and rules for privacy protection. These principles help us to propose an innovative, easy-to-use identity management framework for MANets. The framework makes the flow of partial identities explicit; gives users control over such identities based on their respective situations and contexts, and creates a balance between convenience and privacy. The book presents our proposed framework, its development and lab results/evaluations, and outlines possible future work to improve the framework. This book will be of great interest and benefit to undergraduate students undertaking computer science modules on security and ubiquitous computing and postgraduate students studying the security of large scale systems of systems composition, as well as those doing their projects in those areas. The book will also accommodate the needs of early researchers and DPhil/PhD or MPhil students exploring the concept of security in ubiquitous environments, while additionally being of great interest to lecturers teaching related modules and industrial researchers.




Mobile Cloud Computing


Book Description

Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devices and services. The book describes mobile cloud clouding concepts with a particular focus on a user-centric approach, presenting a distributed mobile cloud service model called POEM to manage mobile cloud resource and compose mobile cloud applications. It concludes with a close examination of the security and privacy issues of mobile clouds. - Shows how to construct new mobile cloud based applications - Contains detailed approaches to address security challenges in mobile cloud computing - Includes a case study using vehicular cloud




New Network Architectures


Book Description

"Future Internet" is a worldwide hot topic. The Internet has become a critical infrastructure for business development and social interactions. However, the immense growth of the Internet has resulted in additional stresses on its architecture, resulting in a network difficult to monitor, understand, and manage due to its huge scale in terms of connected devices and actors (end users, content providers, equipment vendors, etc). This book presents and discusses the ongoing initiatives and experimental facilities for the creation of new Future Internet Architectures using alternative approaches like Clean Slate and Incremental improvements: It considers several possible internet network use scenarios that include seamless mobility, ad hoc networks, sensor networks, internet of things and new paradigms like content and user centric networks.




New Horizons in Mobile and Wireless Communications, Volume 2: Networks, Services and Applications


Book Description

Based on cutting-edge research projects in the field, this book (part of a comprehensive 4-volume series) provides the latest details and covers the most impactful aspects of mobile, wireless, and broadband communications development. These books present key systems and enabling technologies in a clear and accessible manner, offering you a detailed roadmap the future evolution of next generation communications. Other volumes cover Networks, Services and Applications; Reconfigurability; and Ad Hoc Networks.




Information Systems Development


Book Description

Information Systems Development (ISD) progresses rapidly, continually creating new challenges for the professionals involved. New concepts, approaches and techniques of systems development emerge constantly in this field. Progress in ISD comes from research as well as from practice. This conference will discuss issues pertaining to information systems development (ISD) in the inter-networked digital economy. Participants will include researchers, both experienced and novice, from industry and academia, as well as students and practitioners. Themes will include methods and approaches for ISD; ISD education; philosophical, ethical, and sociological aspects of ISD; as well as specialized tracks such as: distributed software development, ISD and knowledge management, ISD and electronic business / electronic government, ISD in public sector organizations, IOS.




AI-Based Digital Health Communication for Securing Assistive Systems


Book Description

The security of assistive systems in AI-based digital health communication is a critical challenge, leaving users vulnerable to threats and attacks. AI-Based Digital Health Communication for Securing Assistive Systems provides a comprehensive solution by integrating artificial intelligence (AI) with cybersecurity measures. Edited by Vijeyananthan Thayananthan, this groundbreaking book equips assistive technology developers, researchers, and professionals with the knowledge and tools necessary to safeguard these systems and protect user privacy and well-being. Covering topics such as assistive communication technology, secure assistive technologies, robotics, and AI-based eHealth applications, the book explores innovative approaches to enhance the security of assistive systems. It offers practical guidance and insights into the strategic role of AI-based cybersecurity, empowering readers to protect individuals relying on assistive systems. Professionals, researchers, and scholars in the field of digital health communication will find this book invaluable, especially assistive technology developers looking to enhance their understanding of AI-based cybersecurity. Postgraduate students, research scientists, and academic research scholars will also benefit from the book's valuable insights and advancements. Executives and healthcare management professionals involved in digital health communication can leverage the book's expertise to drive organizational development and create a safer environment for individuals dependent on assistive systems.




Design Solutions for User-Centric Information Systems


Book Description

Continuous improvements in technological applications have allowed more opportunities to develop systems with user-focused designs. This not only leads to higher success in day-to-day usage, but it increases the overall probability of technology adoption. Design Solutions for User-Centric Information Systems provides a comprehensive examination of the latest strategies and methods for creating technological systems with end users as the focal point of the design process. Highlighting innovative practices and applications across a variety of areas, such as cloud-based computing services, e-government adoption, and logistics evaluation, this book is an ideal reference source for computer engineers, practitioners, project managers, graduate students, and researchers interested in the enhancement of user-centric information system development.




Advanced Health Telematics and Telemedicine


Book Description

In this publication, leading experts present all the different aspects to be met for practically enabling advanced health telematics and telemedicine such as architectural issues, electronic health records, communication, security and safety as well as the legal and ethical implications. The international collaboration work's outcome, ongoing efforts and future directions are discussed in deep and broad detail. Represented by health professionals, computer scientists, managers, lawyers and politicians, the book addresses developers, users and decision-makers as well.