Ubisafe computing: Vision and challenges (I)

Ma Jianhua, Qiangfu Zhao, Vipin Chaudhary, Jingde Cheng, Laurence T. Yang, Runhe Huang, Qun Jin

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)

    Abstract

    In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people sometime, somewhere; a few of them can even gratify some of the people anytime, anywhere. However, at present, none of the computing paradigms intend to gratify all the people anytime, anywhere. With the rapid advance of information technology and the spread of information services, the IT disparity in age, social standing, and race of the people has been expanding and has become a critical social problem of the 21st century. Thus, we have a fundamental question: Can we construct, in a unified methodology, a computing environment that can gratify all the people in all situations, all places and all the time? We propose a novel and inclusive computing paradigm, named ubisafe computing, for studying and providing possible solutions to the above problem. The ultimate goal of ubisafe computing is to build a computing environment in which all people and organizations can benefit from ubiquitous services anytime anywhere with assured and desired satisfaction without worrying or thinking about safety. That is, the ubisafe computing vision emphasizes two basic aspects: ubiquitous safety and ubiquitous satisfaction to all people in all situations. This paper presents the motivations for the ubisafe computing vision but focuses on one basic aspect of ubiquitous safety that covers reliability, security, privacy, persistency, trust, risk, out of control, and other watchfulness while considering novel, essential ubicomp or percomp features of unobtrusive computers, diverse users/people and life-like systems.

    Original languageEnglish
    Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Pages386-397
    Number of pages12
    Volume4158 LNCS
    Publication statusPublished - 2006
    EventThrid International Conference on Autonomic and Trusted Computing, ATC 2006 - Wuhan
    Duration: 2006 Sep 32006 Sep 6

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume4158 LNCS
    ISSN (Print)03029743
    ISSN (Electronic)16113349

    Other

    OtherThrid International Conference on Autonomic and Trusted Computing, ATC 2006
    CityWuhan
    Period06/9/306/9/6

    Fingerprint

    Safety
    Computing
    Computing Methodologies
    Information Services
    Privacy
    Social Problems
    Information services
    Information technology
    Motivation
    Paradigm
    Organizations
    Technology
    Vision
    Information Technology
    Cover
    Methodology
    Thinking

    ASJC Scopus subject areas

    • Computer Science(all)
    • Biochemistry, Genetics and Molecular Biology(all)
    • Theoretical Computer Science

    Cite this

    Jianhua, M., Zhao, Q., Chaudhary, V., Cheng, J., Yang, L. T., Huang, R., & Jin, Q. (2006). Ubisafe computing: Vision and challenges (I). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4158 LNCS, pp. 386-397). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4158 LNCS).

    Ubisafe computing : Vision and challenges (I). / Jianhua, Ma; Zhao, Qiangfu; Chaudhary, Vipin; Cheng, Jingde; Yang, Laurence T.; Huang, Runhe; Jin, Qun.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4158 LNCS 2006. p. 386-397 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4158 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Jianhua, M, Zhao, Q, Chaudhary, V, Cheng, J, Yang, LT, Huang, R & Jin, Q 2006, Ubisafe computing: Vision and challenges (I). in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 4158 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4158 LNCS, pp. 386-397, Thrid International Conference on Autonomic and Trusted Computing, ATC 2006, Wuhan, 06/9/3.
    Jianhua M, Zhao Q, Chaudhary V, Cheng J, Yang LT, Huang R et al. Ubisafe computing: Vision and challenges (I). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4158 LNCS. 2006. p. 386-397. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    Jianhua, Ma ; Zhao, Qiangfu ; Chaudhary, Vipin ; Cheng, Jingde ; Yang, Laurence T. ; Huang, Runhe ; Jin, Qun. / Ubisafe computing : Vision and challenges (I). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4158 LNCS 2006. pp. 386-397 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    @inproceedings{6334b84324bc42a6bad4c9b0185bb0e7,
    title = "Ubisafe computing: Vision and challenges (I)",
    abstract = "In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people sometime, somewhere; a few of them can even gratify some of the people anytime, anywhere. However, at present, none of the computing paradigms intend to gratify all the people anytime, anywhere. With the rapid advance of information technology and the spread of information services, the IT disparity in age, social standing, and race of the people has been expanding and has become a critical social problem of the 21st century. Thus, we have a fundamental question: Can we construct, in a unified methodology, a computing environment that can gratify all the people in all situations, all places and all the time? We propose a novel and inclusive computing paradigm, named ubisafe computing, for studying and providing possible solutions to the above problem. The ultimate goal of ubisafe computing is to build a computing environment in which all people and organizations can benefit from ubiquitous services anytime anywhere with assured and desired satisfaction without worrying or thinking about safety. That is, the ubisafe computing vision emphasizes two basic aspects: ubiquitous safety and ubiquitous satisfaction to all people in all situations. This paper presents the motivations for the ubisafe computing vision but focuses on one basic aspect of ubiquitous safety that covers reliability, security, privacy, persistency, trust, risk, out of control, and other watchfulness while considering novel, essential ubicomp or percomp features of unobtrusive computers, diverse users/people and life-like systems.",
    author = "Ma Jianhua and Qiangfu Zhao and Vipin Chaudhary and Jingde Cheng and Yang, {Laurence T.} and Runhe Huang and Qun Jin",
    year = "2006",
    language = "English",
    isbn = "354038619X",
    volume = "4158 LNCS",
    series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
    pages = "386--397",
    booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

    }

    TY - GEN

    T1 - Ubisafe computing

    T2 - Vision and challenges (I)

    AU - Jianhua, Ma

    AU - Zhao, Qiangfu

    AU - Chaudhary, Vipin

    AU - Cheng, Jingde

    AU - Yang, Laurence T.

    AU - Huang, Runhe

    AU - Jin, Qun

    PY - 2006

    Y1 - 2006

    N2 - In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people sometime, somewhere; a few of them can even gratify some of the people anytime, anywhere. However, at present, none of the computing paradigms intend to gratify all the people anytime, anywhere. With the rapid advance of information technology and the spread of information services, the IT disparity in age, social standing, and race of the people has been expanding and has become a critical social problem of the 21st century. Thus, we have a fundamental question: Can we construct, in a unified methodology, a computing environment that can gratify all the people in all situations, all places and all the time? We propose a novel and inclusive computing paradigm, named ubisafe computing, for studying and providing possible solutions to the above problem. The ultimate goal of ubisafe computing is to build a computing environment in which all people and organizations can benefit from ubiquitous services anytime anywhere with assured and desired satisfaction without worrying or thinking about safety. That is, the ubisafe computing vision emphasizes two basic aspects: ubiquitous safety and ubiquitous satisfaction to all people in all situations. This paper presents the motivations for the ubisafe computing vision but focuses on one basic aspect of ubiquitous safety that covers reliability, security, privacy, persistency, trust, risk, out of control, and other watchfulness while considering novel, essential ubicomp or percomp features of unobtrusive computers, diverse users/people and life-like systems.

    AB - In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people sometime, somewhere; a few of them can even gratify some of the people anytime, anywhere. However, at present, none of the computing paradigms intend to gratify all the people anytime, anywhere. With the rapid advance of information technology and the spread of information services, the IT disparity in age, social standing, and race of the people has been expanding and has become a critical social problem of the 21st century. Thus, we have a fundamental question: Can we construct, in a unified methodology, a computing environment that can gratify all the people in all situations, all places and all the time? We propose a novel and inclusive computing paradigm, named ubisafe computing, for studying and providing possible solutions to the above problem. The ultimate goal of ubisafe computing is to build a computing environment in which all people and organizations can benefit from ubiquitous services anytime anywhere with assured and desired satisfaction without worrying or thinking about safety. That is, the ubisafe computing vision emphasizes two basic aspects: ubiquitous safety and ubiquitous satisfaction to all people in all situations. This paper presents the motivations for the ubisafe computing vision but focuses on one basic aspect of ubiquitous safety that covers reliability, security, privacy, persistency, trust, risk, out of control, and other watchfulness while considering novel, essential ubicomp or percomp features of unobtrusive computers, diverse users/people and life-like systems.

    UR - http://www.scopus.com/inward/record.url?scp=33750075008&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=33750075008&partnerID=8YFLogxK

    M3 - Conference contribution

    AN - SCOPUS:33750075008

    SN - 354038619X

    SN - 9783540386193

    VL - 4158 LNCS

    T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    SP - 386

    EP - 397

    BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    ER -