Ubisafe computing: Vision and challenges (I)

Ma Jianhua, Qiangfu Zhao, Vipin Chaudhary, Jingde Cheng, Laurence T. Yang, Runhe Huang, Qun Jin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Abstract

In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people sometime, somewhere; a few of them can even gratify some of the people anytime, anywhere. However, at present, none of the computing paradigms intend to gratify all the people anytime, anywhere. With the rapid advance of information technology and the spread of information services, the IT disparity in age, social standing, and race of the people has been expanding and has become a critical social problem of the 21st century. Thus, we have a fundamental question: Can we construct, in a unified methodology, a computing environment that can gratify all the people in all situations, all places and all the time? We propose a novel and inclusive computing paradigm, named ubisafe computing, for studying and providing possible solutions to the above problem. The ultimate goal of ubisafe computing is to build a computing environment in which all people and organizations can benefit from ubiquitous services anytime anywhere with assured and desired satisfaction without worrying or thinking about safety. That is, the ubisafe computing vision emphasizes two basic aspects: ubiquitous safety and ubiquitous satisfaction to all people in all situations. This paper presents the motivations for the ubisafe computing vision but focuses on one basic aspect of ubiquitous safety that covers reliability, security, privacy, persistency, trust, risk, out of control, and other watchfulness while considering novel, essential ubicomp or percomp features of unobtrusive computers, diverse users/people and life-like systems.

Original languageEnglish
Title of host publicationAutonomic and Trusted Computing - Thrid International Conference, ATC 2006, Proceedings
PublisherSpringer Verlag
Pages386-397
Number of pages12
ISBN (Print)354038619X, 9783540386193
Publication statusPublished - 2006 Jan 1
EventThrid International Conference on Autonomic and Trusted Computing, ATC 2006 - Wuhan, China
Duration: 2006 Sep 32006 Sep 6

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4158 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceThrid International Conference on Autonomic and Trusted Computing, ATC 2006
CountryChina
CityWuhan
Period06/9/306/9/6

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Ubisafe computing: Vision and challenges (I)'. Together they form a unique fingerprint.

  • Cite this

    Jianhua, M., Zhao, Q., Chaudhary, V., Cheng, J., Yang, L. T., Huang, R., & Jin, Q. (2006). Ubisafe computing: Vision and challenges (I). In Autonomic and Trusted Computing - Thrid International Conference, ATC 2006, Proceedings (pp. 386-397). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4158 LNCS). Springer Verlag.