Interoperable Spatial Information Model and Design Environment Based on Ucr Technology

Total Page:16

File Type:pdf, Size:1020Kb

Interoperable Spatial Information Model and Design Environment Based on Ucr Technology IEICE TRANS. INF. & SYST., VOL.E96–D, NO.1 JANUARY 2013 51 PAPER Interoperable Spatial Information Model and Design Environment Based on ucR Technology Yukihiko SHIGESADA†a), Nonmember, Shinsuke KOBAYASHI††, Member, Noboru KOSHIZUKA††,†††, and Ken SAKAMURA††,†††, Nonmembers SUMMARY Context awareness is one of the ultimate goals of ubiqui- commonly use a geographic identifier of location; for exam- tous computing, and spatial information plays an important role in building ple, the name of building such as Tokyo tower, or address. context awareness. In this paper, we propose a new interoperable spatial Geographic identifier is very useful because people remem- information model, which is based on ucode relation (ucR) and Place Iden- tifier (PI), for realizing ubiquitous spatial infrastructure. In addition, we ber a location by the name of the location. propose a design environment for spatial information database using our International standard ISO 19112 [4] is based on geo- model. Our model is based on ucode and its relation. ucode is 128 bits num- graphic identifier method. But, industries and communities ber and the number itself has no meaning. Hence, it is difficult to manage have proposed dedicated specifications such as Google map, the relation between ucodes without using a tool. Our design environment ffi provides to describe connection between each ucode visually and is able to then, it is di cult to interoperate the geographic identifier. manipulate data using the target space map interactively. To evaluate the To solve the problem, Place Identifier (PI) [5] has been pro- proposed model and environment, we designed three spaces using our tool. posed. PI is a specification to unify such identifiers, and it is In addition, we developed a web application using our spatial model. From submitted to ISO/TC211 [6] for consideration. PI is not uni- ff evaluation, we have been showed that our model is e ective and our design fied geographic identifier for worldwide use, but it provides environment is useful to develop our spatial information model. key words: spatial information system, ubiquitous computing, ubiquitous interoperability for dedicated identifiers that are proposed spatial infrastructure, spatial databases and GIS, web based services for each community. However, PI is not flexible enough to deal with complex geographic identifiers, because there are 1. Introduction many identifiers for the same location, and PI requires every identifier to be registered. For instance, suppose a depart- ment store and users want to refer to the information about Many researchers are interested in ubiquitous computing, a shop of the department store. Users can specify the shop pervasive computing, or the Internet of Things [1] which is by using the name of the shop like “UNIQLO”. However, a new paradigm of information and communication tech- users can also specify it by the name of the shop and the nology. One of the important technologies to realize such floor like “UNIQLO at 6th floor”. In such case, PI frame- paradigms is context-awareness. Context is defined as “any work requires each identifier to be registered to geographical information that can be used to characterize the situation of dictionary. Hence, huge numbers of geographic identifiers an entity.” [2] Generally, context includes four categories; should be registered for every location. location, identity, activity and time. Especially, location In this paper, we propose a novel spatial information plays an important role to realize ubiquitous or pervasive model based on ucR (ucode Relation) [7]. “ucR” is a repre- computing. Spatial modeling is required in order to utilize sentation for context which uses identifiers called “ucode” location information on computers efficiently. and relationships between identifiers. These relations form Traditionally, coordinate methods have been used for a very large directed graph like RDF [8], where each node is modeling spaces. However, it is difficult to match human a ucode or a string literal (that is an attribute of the ucode), context because coordinate method can only represent phys- and each edge is a relation between a ucode and another ical place. It cannot represent location for human under- ucode or between a ucode and a string literal. The feature of standing such as building, floor, and room. International this model is high scalability because it is based on dynamic standard ISO 19111 [3] is one of the examples. The fea- linking. In addition, we use triplestore to build our database, ture of ISO 19111 is to describe the location in the globe and its schema is more flexible and extensible than relational uniquely and accurately. Meanwhile, coordinates such database schema. Moreover, we propose a flexible method as latitude and longitude are not used in daily life, we to create new geographic identifiers by using combination of Manuscript received March 5, 2012. registered geographic identifiers. As mentioned before, pre- Manuscript revised August 19, 2012. vious work such as PI requires registering every identifier in †The author is with Hosei University, Tokyo, 102–8160 Japan. a geographical dictionary even if they can be defined by the †† The authors are with YRP Ubiquitous Networking Labora- combination of identifiers that are already registered in the tory, Tokyo, 141–0031 Japan. dictionary. Using our method, operation cost and amount of †††The authors are with The University of Tokyo, Tokyo, 113– 0033 Japan. data can be reduced. a) E-mail: [email protected] In addition, we propose a design environment to de- DOI: 10.1587/transinf.E96.D.51 velop spatial information database using our model. It is Copyright c 2013 The Institute of Electronics, Information and Communication Engineers IEICE TRANS. INF. & SYST., VOL.E96–D, NO.1 JANUARY 2013 52 difficult to develop the proposed spatial model without using neighbor, and range. Moreover, our method provides gen- our environment because our model is based on dynamic erating new identifiers to solve a problem of PI framework linking, so the model is not human friendly but machine that we mentioned in Sect. 1. friendly. In our method, connection between each ucode ISO/TC211 discusses standardization about digital ge- can be seen visually and can be manipulated using the target ometric information services. ISO/TC211 consists of sev- space map interactively. eral projects. ISO19111 is the project for spatial referencing The main differences between this work and previous by coordinates, and ISO19112 is the project for spatial refer- ones [9], [10] are that we have shown the design environ- encing by geographic identifiers. As we mentioned before, ment of our spatial model, and have shown that the envi- the feature of ISO19111 is to describe the location in the ronment is effective to describe spatial information. ucode globe uniquely and accurately by using coordinate. Mean- is 128 bits number and the number itself has no meaning. while, coordinate such as latitude and longitude is not used Hence, it is difficult to manage the relation between ucodes in daily life, we commonly use an identifier of geographic without using a tool. In experimental result, we have shown location. Hence, geographic location based method is re- that an indoor place, such as a museum or a department quired. ISO19112 is one of the activities to specify geo- store, can be described within several hours. In addition, graphic location based method. However, it is difficult to we have developed an application using our spatial model, interoperate geographic identifiers, because there are many and showed the effectiveness of our spatial model. dedicated geographic location based specifications proposed The rest of the paper is organized as follows. In the by industries and communities. next section, we discuss about related work. In Sect. 3, the Place Identifier is a specification to unify such identi- proposed model is described. In Sect. 4, we describe the fiers, and it is discussed at ISO/TC211 as an international proposed method and environment using our spatial model. standard (ISO19155). In PI, the term PI is also used for the In Sect. 5, we describe experiment using our model. Finally, geographic identifier. Therefore, in the rest of the paper, we the conclusion is described. use the term “PI framework” for the framework of PI, and the term “PI” for the geographic identifier of the PI frame- 2. Related Work work. In the PI framework, PI interfaces are defined in order to communicate between PI platform and users [14]. In this section, we describe methods of location modeling There are 6 kinds of PI interfaces such as “PI registration for context awareness, and international standards for loca- interface” to register spatial reference system and PI, and tion modeling. “PI conversion interface” to convert a geographic identifier Many researchers have already proposed methods of to another geographic identifier which represents the same location modeling. Paper [11] surveys location modeling. It place. By implementing web API PI interfaces for every mentioned that four queries are needed in order to realize geographic database which is represented by the PI frame- location-based application; position, nearest neighbor, nav- work, we can interoperate geographic identifier and can cre- igation, and range queries. According to the paper, there ate worldwide geographic database. In the PI framework, are two categories of location modeling; one is geographic PI LocationInstance is defined to describe data of PI. It model and the other is symbolic model. Symbolic model can represent not only the geographic identifier, but also the consists of four categories; set-based, hierarchical, graph- position and the relationship between other PIs (Table 1). based, combined (set-based and graph-based). In addition, “alternativeGeographicIdentifier” is defined in order to reg- hybrid models that support geometric and symbolic have ister the alternative geographic identifier of location. How- been proposed. It mentioned two types of hybrid location ever, this information cannot be used as a formal PI.
Recommended publications
  • Human-Computer Interaction Technologies in Japan
    Japanese Technology Evaluation Center JTEC JTEC Panel Report on HUMAN-COMPUTER INTERACTION TECHNOLOGIES IN JAPAN James D. Foley (Panel Chair) Ephraim P. Glinert James D. Hollan Robert E. Kraut Thomas B. Sheridan Tim Skelly March 1996 _________________________________________________________________________ International Technology Research Institute Michael J. DeHaemer, JTEC/WTEC Director Geoffrey M. Holdridge, JTEC/WTEC Series Editor Loyola College in Maryland 4501 North Charles Street Baltimore, Maryland 21210-2699 _________________________________________________________________________ JTEC PANEL ON HUMAN-COMPUTER INTERACTION TECHNOLOGIES Sponsored by the National Science Foundation, the Defense Advanced Research Projects Agency, the Department of Commerce, and the Office of Naval Research of the United States Government Dr. James D. Foley (Panel Chair) Dr. Robert E. Kraut Professor of Computer Science Professor of Social Psychology and Director of Graphics, Visualization Human Computer Interaction & Usability Center Carnegie Mellon University Georgia Institute of Technology 1307 Wean Hall 801 Atlantic Pittsburgh, PA 15213 Atlanta, GA 30332-0280 Dr. Thomas B. Sheridan Dr. Ephraim P. Glinert Professor of Engineering and Applied Psychology Professor of Computer Science Massachusetts Institute of Technology Rensselaer Polytechnic Institute Room 3-346 127 Amos Eaton Bldg. Cambridge, MA 02139 Troy, NY 12180-3590 Mr. Tim Skelly Dr. James D. Hollan Microsoft Corporation Professor and Chair 1 Microsoft Way Department of Computer Science Redmond, WA 98052-6399 University of New Mexico Albuquerque, NM 87131-1386 INTERNATIONAL TECHNOLOGY RESEARCH INSTITUTE JTEC/WTEC PROGRAM The Japanese Technology Evaluation Center (JTEC) and its companion World Technology Evaluation Center (WTEC) at Loyola College provide assessments of foreign research and development in selected technologies under a cooperative agreement with the National Science Foundation (NSF).
    [Show full text]
  • TRON Forum Admission Guide
    TRON Forum Admission Guide TRON Forum TRON Forum (Location: Shinagawa, Tokyo, Chair: Ken Sakamura, Dean, Faculty of Information Networking for Innovation and Design (INIAD), Toyo University) has been established in 2002 to promote TRON Project which aims to realize the open IoT (Internet of Things) free from constraints of organizations and applications based on “open source,” “open data” and “open API.” The forum has conducted vigorous activities led by Chair Sakamura focusing on T-Engine Project that aims to improve the development environment of embedded systems and operating Ubiquitous ID Center which promotes and disseminates ubiquitous ID architecture and its component technologies such as ucode. The forum has received good reviews worldwide for its activities. For example, Chair Ken Sakamura was honored with an ITU150 Award (*) in May 2015 for proposing TRON open architecture, the origin of ubiquitous networking and the IoT. He was the only winner in Asia among the six winners that included Bill Gates. In 2018, TRON Forum has contributed to create the real-time OS standard for small embedded systems such as IoT terminal devices, "IEEE 2050-2018" (IEEE is TRON Forum Chair: Ken Sakamura the world's largest organization for electric and electronic engineers). In 2019, it has created "TRON IoT Vulnerability Advisory Center”. Its activity has expanded in many directions. (*)On the occasion of the 150th Anniversary of ITU (International Telecommunication Union, the United Nations specialized agency for ICTs, HQ: Geneva, Switzerland), ITU150 Awards were launched to recognize individuals past and present from government, ICT industry, academia, and civil society that have contributed to improving lives of world citizens through ICT innovations developed, promoted or implemented by ITU.
    [Show full text]
  • Japan's Visible Light Communications Consortium and Its Standardization Activities
    Japan's Visible Light Communications Consortium and Its Standardization Activities Shinichiro Haruyama, Ph.D. Vice Chairman VLCC (Visible Light Communications Consortium) Tokyo, Japan Department of Information and Computer Science, Faculty of Science and Technology, Keio University Yokohama, Japan Shinichiro Haruyama Visible Light Communications Consortium 1 Contents • Why is the standard for visible light communication needed? • Position Detection: One of the important applications of Visible Light Communication • Visible Light Communications Consortium (VLCC) • Standardization Activities in Japan Shinichiro Haruyama Visible Light Communications Consortium 2 Why is the standard for visible light communication needed? Various applications and products of Visible Light Communication are expected to appear. The problem of the mutual interference between different products and the problem and interchangeability are expected if they use different communication methods. Moreover, it is necessary to consider interference of Visible light communication devices against existing infrared devices. Shinichiro Haruyama Visible Light Communications Consortium 3 Contents • Why is the standard for visible light communication needed? • Position Detection: One of the important applications of Visible Light Communication • Visible Light Communications Consortium (VLCC) • Standardization Activities in Japan Shinichiro Haruyama Visible Light Communications Consortium 4 Position Detection Position Detection is one of the important applications of Visible Light Communication. A visible light source such as an A visible light source such as an LED lamp sends a code indicating LED lamp sends a code indicating that its location is “Position 1”. that its location is “Position 1”. It is possible to detect a fairly accurate position using a visible light source if it sends a code indicating its position. When a use moves around, he/she can know an accurate position indoor or outdoor.
    [Show full text]
  • Ken Sakamura
    2014 TRON Symposium. 30th Anniversary TRON Project 30th Anniversary and Its Future Outlook Embedded systems technology to support the utilization of the IoT big data and future plan for T-Engine Ken Sakamura Professor, Graduate School of Interdisciplinary Studies, The University of Tokyo Director of YRP Ubiquitous Networking Laboratory Chair of T-Engine Forum / uID Center 2014 TRON Symposium. 30th Anniversary ① TRON Project The Real-time Operating system Nucleus The 30th anniversary in 2014 One of the longest lasting projects related to Japanese computing Copyright © 2014 by Ken SAKAMURA 2 2014 TRON Symposium. 30th Anniversary What is TRON? RTOS for system control, and has different basic architecture from Windows and Linux RTOS: Real-Time Operating System Copyright © 2014 by Ken SAKAMURA 3 2014 TRON Symposium. 30th Anniversary TRON RTOS Is Embedded in Many Things “HAYABUSA” (MUSES-C), an asteroid explorer “IKAROS, ” Interplanetary Kite-craft Accelerated by Radiation Of the Sun 4 2014 TRON Symposium. 30th Anniversary TRON Project’s Root Is in Embedded Systems 5 2014 TRON Symposium. 30th Anniversary ② 30 Years of TRON Copyright © 2014 by Ken SAKAMURA 6 2014 TRON Symposium. 30th Anniversary Started in 1984 Copyright © 2014 by Ken SAKAMURA 7 2014 TRON Symposium. 30th Anniversary Historical Background at the Time Copyright © 2014 by Ken SAKAMURA 8 I4004 by Intel (1971) 2014 TRON Symposium. 30th Anniversary Alto by Xerox (1973) 2014 TRON Symposium. 30th Anniversary 2014 TRON Symposium. 30th Anniversary ③ Future Design Copyright © 2014 by Ken SAKAMURA 11 2014 TRON Symposium. 30th Anniversary How the Society Will Change Based on Newly Available Computers? Copyright © 2014 by Ken SAKAMURA 12 2014 TRON Symposium.
    [Show full text]
  • Uid Architecture Uid Architecture
    uIDuID ArchitectureArchitecture anan OpenOpen FoundationFoundation forfor UbiquitousUbiquitous computingcomputing Ken Sakamura, Ph.D. Professor, the University of Tokyo Director, YRP Ubiquitous Networking Laboratory (UNL) Chair, T-Engine Forum / uID Center UbiquitousUbiquitous ComputingComputing TechnologyTechnology ■ Very interesting and useful technology ■ Conventional Usage Pattern: ● Closed, proprietary solution in a single organization ■ Our Approach (uID Architecture) ● Not limited to a single organization ● Open Standard ● Works across organizational boundary and national boundary Copyright by Ken Sakamura. 2005 All rights reserved 2 1 BeneficiariesBeneficiaries ofof uIDuID ArchitectureArchitecture ■ The benefit of RFID technology is shared among producers, distributors, and end- consumers and people beyond simple Supply-Chain Management (SCM) ■ Food Traceability Experiment ● later explained ■ Medicine Traceability Experiment ● later explained Copyright by Ken Sakamura. 2005 All rights reserved 3 OutlineOutline ofof Today'sToday's SpeechSpeech 1. Basic uID Architecture 2. Wide applicability of open uID Architecture ●Exemplified by many feasibility study experiments 3. Comparison of approaches taken by uID Architecture / EPCglobal Copyright by Ken Sakamura. 2005 All rights reserved 4 2 BasicBasic uIDuID ArchitectureArchitecture ■The objective of uID Architecture is to recognize many objects and places in our surrounding “Context Awareness” Copyright by Ken Sakamura. 2005 All rights reserved 5 ContextContext Awareness:Awareness: RecognizingRecognizing manymany objectsobjects andand placesplaces ■ Identifying something so that you can tell that it is differentiate from others ■ To make machine identification easy, we store a unique identification number (ucode) in a tag and place it on an object or a location ■ cf. In our approach, creating and managing the unique number is very important ● This is why we have uID Center to manage such requirements Copyright by Ken Sakamura.
    [Show full text]
  • Cpaas.Io: an Eujapan Collaboration on Open Smart City Platforms
    CPaaS.io: An EUJapan Collaboration on Open Smart City Platforms Noboru Koshizuka (The University of Tokyo) Stephan Haller (Bern University of Applied Sciences) Ken Sakamura (Toyo University) Abstract Data-driven cities and governments rely significantly on data collec- tion, management, and distribution platforms. In this article, we intro- duce CPaaS.io, a collaborative project between Japan and the European Union with the goal of establishing common smart city platforms for de- ployment in real smart city use cases. 1 INTRODUCTION Today, data are crucial to the functioning of society. In fact, it is sometimes said that the most competitive area in information and communications technology (ICT) is not algorithms but data. The ICT National Strategy of Japan known as Society 5.0 proposes a data-driven society in which data help solve problems in the fields of mobility, supply chains, healthcare, and lifestyle to name a few. This will generate further economic growth and increase quality of life. Conse- quently, both in Japan and the European Union (EU), data have been termed the oil of the 21st century. These data come from a variety of sources: the Internet of Things (IoT) and sensors, open government resources, social media, and industry and business repositories, not to mention the wealth of personal information from individual users. These can be obtained, linked, and analyzed to extract valuable intelligence and transform our society for a better future. In the deployment of smart city services, providing a platform for data collection, management, and distribution is crucial. This manuscript has been published in Computer (Volume: 51 , Issue: 12 , Dec.
    [Show full text]
  • Ken SAKAMURA the Iot in Action
    Copyright © 2016 by Ken SAKAMURA The IoT in Action Ken Sakamura Professor and Director of Institute of Infrastructure Application of Ubiquitous Computing (IAUC), Interfaculty Initiative in Information Studies, Graduate School, the University of Tokyo Director, YRP Ubiquitous Networking Laboratory Chair, TRON Forum / uID Center Copyright © 2016 by Ken Sakamura Building Controlled by Open API ① INIAD HUB-1 Every facility in the building can be controlled via API 2 INIAD HUB-1 (Akabanedai, to be opened in2017) Copyright © 2016 by Ken Sakamura Open API Control API (Application Program Interface) API is a means of passing the command and the command itself for a system to control others automatically The operating status of building facilities, environmental control devices, etc. can be read and they can be controlled via network by means of API. 5 Copyright © 2016 by Ken Sakamura Use pf open API in research and education █ Feasibility study of prototype applications for the IoT research ● Operation of autonomous robot wheelchairs and drones on campus ● Introducing deep learning AI technology for the optimized use of energy or security on campus █ Students can learn how to control their environment by programming in tutorial classes ● Proposal of new business that uses the IoT technology and practicing prototypte creation 6 cf) Daiwa Ubiquitous Computing Research Building Built in May, 2015 on in the Hongo campus of the University of Tokyo Already conducted many experiments to learn knowhows of open IoT building 7 Copyright © 2016 by Ken Sakamura Daiwa Ubiquitous Computing Research Building as a Research Platform Uses the building itself as platform for the research on the IoT environment 10 Copyright © 2016 by Ken Sakamura API for Daiwa Ubiquitous Computing Research Building 1.
    [Show full text]
  • International Telecommunication Union (ITU) 150 Awards Recognize
    Press Release Tokyo, Japan, May 15, 2015 International Telecommunication Union (ITU) 150 Awards recognize Ken Sakamura, Director of YRP Ubiquitous Networking Laboratory (Professor of Graduate School of Interdisciplinary Information Studies, The University of Tokyo) Ken Sakamura, Director of YRP Ubiquitous Networking Laboratory (Professor of Graduate School of Interdisciplinary Information Studies, The University of Tokyo) will be honored with ITU’s 150th Anniversary Award at the commemorative event that will be held at the headquarters of ITU in Geneva on 17 May 2015. Sakamura has contributed to the research and education of computer science for a long time, has conducted the research and development of the computer system of open architecture with high real-time performance named TRON(The Real-time Operating system Nucleus). As the result, he has released and promoted an open software platform (operating system) to the world for free. He has proposed the concept of ubiquitous computing environment or the Internet of Things (IoT) in which many objects in our surroundings are embedded with small computer nodes with sensors and actuators that are connected to the network, communicate with each other and operate in a cooperative manner to offer sophisticated services to human users since the 1980s and has contributed to the achievement. (Comment of the winner) I am honored to be recognized for the results of years of my research activities, and would like to express my most heartfelt gratitude for the award on the occasion of ITU’s 150th Anniversary. I would like to thank people who have helped and supported us for a long time.
    [Show full text]
  • Ken Sakamura
    Open IoT Platform & IoT-Engine Ken Sakamura Professor, Director of Institute of Infrastructure Application of Ubiquitous Computing (IAUC), Interfaculty Initiative in Information Studies, Graduate School, the University of Tokyo Director, YRP Ubiquitous Networking Laboratory Chair, TRON Forum / uID Center Seven semiconductor manufacturers from six countries and regions have already expressed intention to commcericialize IoT- Engine Participating semiconductor manufacturers (at the time of the press conference on April 27, 2016) ■ Toshiba Microelectronics Corporation ■ Renesas Electronics Corporation ■ Cypress Semiconductor Corporatation ■ Imagination Technologies Limited ■ Nuvoton Technology Corporation ■ NXP Semiconductors N.V. ■ STMicroelectronics Sales of IoT-Engine and Development kit ■ Personal Media Corporation ■ Ubiqutious Computing Technology Corporation Copyright © 2016 by Ken Sakamura 2 IoT Internet of Things Copyright © 2016 by Ken Sakamura 3 The IoT Can Change the World Only If It Is Open. The Internet changed society because it is an open network which anyone can use for any purpose. Is the "I" in "IoT" truly the "I" of "Internet"? Copyright © 2016 by Ken Sakamura 4 Governance Is Required in the Age of the Open IoT The advanced management "to use something appropriately" requires advanced judgment. Policy-based group management of access rights and partial exposure of data, changing of access rights based on the ordinary and emergency setting, and automatic/augmented judgment by aritificial intelligence Copyright © 2016 by Ken Sakamura 5 The Pressing Issues of Future Embedded Systems Advanced governance management of data and control will become very important. New governence management requires advanced processing and more database resources than the conservative "don't release anything". Copyright © 2016 by Ken Sakamura 6 Hardship of Embedded Systems in the Age of the IoT Access control, which is not the essential function of the embedded systems, requires large amount of computing resource.
    [Show full text]
  • T-Engine Development Kit T-Engine Development Kit FAQ
    Frequently Asked Questions about T-Engine Development Kit T-Engine Development Kit FAQ 1 What is the flow of product development with T-Engine like? Let's take the case of developing a new cellular phone. If you (finished product) and software that run on T-Engine, you can port start developing the software for controlling hardware after the the software on T-Engine including T-Kernel and the middleware development of the hardware is completed, the overall development you used, to the final hardware. You might need, then, to modify period would be too long. For shorter development period, the the software to comply with the final hardware if there is any hardware and the software need to be developed simultaneously. In detail difference between the hardware, such as memory maps. order to achieve this, before you start developing the software, you The more similar the specifications of the final hardware and need to prepare a piece of prototype hardware (a board for T-Engine are, the easier the modifications will be. feasibility assessment) that has similar configurations to the This method might seem like a lot of work in that the software is finished product (i.e., a board highly compatible with the software), developed on one piece of hardware (T-Engine) and migrate it to regardless of the similarity in physical appearance. The hardware another (finished product). However, developing software on a in this case, also called a breadboard, needs to be prepared quickly. common platform (T-Engine) has a lot of benefits: You can use your It can be used as a general-purpose product, or with only minimal existing middleware, and stockpile your own software to be customizations and/or additional expansion boards or devices developed and development know-how for reuse.
    [Show full text]
  • A Secure and Flexible E-Health Access Control System with Provisions for Emergency Access Overrides and Delegation of Access Privileges
    A Secure and Flexible e-Health Access Control System with Provisions for Emergency Access Overrides and Delegation of Access Privileges M. Fahim Ferdous Khan a, Ken Sakamura ab a Interfaculty Initiative in Information Studies, The University of Tokyo, Tokyo, Japan b YRP Ubiquitous Networking Laboratory, Tokyo, Japan [email protected], [email protected] Abstract— Protecting electronic health records (EHR) from greater patient outreach and improved care. However, since all unauthorized access and data breaches has been a great these IT breakthroughs primarily focused on improving challenge for healthcare organizations in recent times. efficiency, reducing cost and incorporating value-added Controlling access to EHR demands a delicate balance between services, e-health has also introduced a number of crucial security and flexibility: There are emergency cases where the privacy and security issues. As more and more healthcare default access control policy must be circumvented in order to save patients’ life – and cases where management of access organizations are adopting electronic health records (EHR), control rights needs to be delegated to some trusted parties. instances of security breaches are increasing at an alarming Therefore, e-Health access control systems must be robust and rate. According to one recent survey [1], about 80% of US- flexible at the same time. Conventional general-purpose access based healthcare executives have reported compromise of control schemes like role-based access control (RBAC) and its their organizations’ information technology by cyber attacks. derivatives emphasize mainly on the robustness of the access In the first third of 2015 alone, more than 99 million control mechanism, and treat flexibility issues like emergency healthcare records have been reported to be exposed through access overrides and delegation management as addenda.
    [Show full text]
  • Japan's Ubiquitous Computing Architecture Is Ready for Prime Time
    FEATURED IN THIS ISSUE ■ T-Engine: Japan’s Ubiquitous Computing News Architecture Is Ready for Prime Time News contact: Shani Murray ■ [email protected] ■ Virtual Displays and the Future of Mobile and Portable Devices T-Engine: Japan’s Ubiquitous Computing Architecture Is Ready for Prime Time Jan Krikke apan is quietly positioning itself for the • Standard T-Engine (75 mm ´ 120 mm) available for T-Engine. According to J next phase in digital technology: ubiq- for portable information devices with the T-Engine Forum Web site (www. uitous computing. A sign of things to comparatively advanced user interface t-engine.org), it includes network pro- come is T-Engine, arguably the most features, such as smart phones; tocol stacks, filing systems, Japanese advanced ubiquitous computing platform • Micro T-Engine (60 mm ´ 80 mm) for language processing, eTRON-specified in the world. T-Engine enables the dis- devices with relatively basic user inter- security software, a GUI, and audio pro- tribution of software resources, includ- face features, such as home electronic cessing. Other middleware will soon be ing middleware developed on T-Kernel, appliances and musical instruments; added to support speech recognition, its compact, real-time operating system. • Nano T-Engine (coin-sized) for small MP3, and digital watermarks. The plat- The platform also features standardized home electronic appliances; and form has also attracted support from hardware and tamper-resistant network • Pico T-Engine for the smallest units in American software makers. Sun Micro- security. a ubiquitous computing environment, systems ported Java to T-Engine, Mon- Ubiquitous computing (one person, such as switches, lighting equipment, taVista did the same with its real-time many computers) is the third era in com- sensors, and valves.
    [Show full text]