INTEROPERABILITY IN PERVASIVE ENTERPRISE INFORMATION SYSTEMS - A Double-Faced Coin between Security and Accessability

Dana Al Kukhun, Florence Sèdes

Abstract

As transparency becomes a key requirement for assuring service quality and user satisfaction, Enterprise Information Systems are seeking to become pervasive in order to deal with the heterogeneity problem of their sub components. In this position paper, we expose the challenges that face Enterprise Information Systems in achieving better data integration, representation and management, while ensuring homogeneous interaction between different software sub components, improving the interaction between different customers and business partners and providing services on different terminals with dynamic connectivity constraints. Finally, we highlight the importance of applying adaptive, proactive and interoperable access control policies that would differentiate between providing local system users with full data accessibility and providing external users with multi-levelled security controls.

References

  1. Al Kukhun, D. and Sedes, F., 2006. “Towards a pervasive computing benchmark”. In MAPS 06, Multimodal and Pervasive Services Workshop, ICPS406, IEEE Conference on Pervasive Services, IEEE, pp. 29-34.
  2. Almenárez, F., Marín, A., Campo, C. and García, C., 2005. “TrustAC: Trust-Based Access Control for Pervasive Devices”. In The 2nd International Conference on Security in Pervasive Computing, Boppard, Germany, pp 225-238.
  3. Campbel, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G. and Mickunas, M. D. 2002. “Towards Security and Privacy for Pervasive Computing”. In Proceedings of International Symposium on Software Security, pp. 1- 15.
  4. Chen, E., Zhang, D., Shi, Y. and Xu G., 2004. “Seamless Mobile Service for Pervasive Multimedia”. In PCM'05, 5th Pacific Rim Conference on Multimedia, IEEE, pp.194-198.
  5. Chung, E. S., Hong, J. I., Lin, J., Prabaker, M. K., Landay, J. A. and Liu, A. L., 2004. “Development and evaluation of emerging design patterns for ubiquitous computing”. In 2004 conference on Designing interactive systems: processes, practices, methods, and techniques, Cambridge, MA, USA, pp. 233 - 242.
  6. Davis, J., Tierney, A., Chang, E., 2005. “A UserAdaptable User Interface Model to Support Ubiquitous User Access to EIS Style Applications”. In COMPSAC'05, The 29th Annual International Computer Software and Applications Conference, IEEE, pp. 351 - 358.
  7. Duan, Y. and Canny, J., 2004. “Protecting User Data in Ubiquitous Computing: Towards trustworthy environments”. In PET'04, Privacy Enhancing Technologies, Springer, pp. 167-185.
  8. Graham, L., 1999. The principles of Interactive design. In Delmar Publishing.
  9. Gschwind, T., Jazayeri, M. and Oberleitner, J., 2002. “Pervasive Challenges for Software Components”. In RISSE'02, 9th International Workshop on Radical Innovations of Software and Systems Engineering in the Future, Springer, pp. 152-166.
  10. Munoz, J. and Pelechano V., 2005. “Building a Software Factory for Pervasive Systems Development”. In Advanced Information Systems Engineering, Springer Berlin / Heidelberg, pp. pp 342-356.
  11. Niemela, E., Latvakoski, J., 2004. “Survey of Requirements and Solutions for Ubiquitous Software”. In The 3rd International Conference on Mobile and Ubiquitous Multimedia, College Park, Maryland, pp 71 - 78.
  12. OASIS, 2003. “A brief Introduction to XACML”. In http://www.oasis-open.org/committees/download.php /2713/Brief_Introduction_to_XACML.html , consulted on april 2007.
  13. OASIS, 2004. “Universal Business Language 1.0”. In http://docs.oasis-open.org/ubl/cd-UBL-1.0 , consulted on april 2007.
  14. Park, I., Kim, W. and Park, Y., 2004. “A Ubiquitous Streaming Framework for Multimedia Broadcasting Service with QoS based mobility Support”. In Information Networking, LNCS 3090 in SpringerVerlag (SCI-E), pp.65-74.
  15. Ranganathan, A., Al-Muhtadi, J., Biehl, J., Ziebart, B. Campbell, R.H. and Bailey, B., 2005. “Towards a pervasive computing benchmark”. In PerCom 2005, Third IEEE International Conference on Pervasive Computing and Communications, IEEE, pp.194-198.
  16. Want, R., Pering, T., Borriello, G. and Farkas, K. 2002 “Disappearing hardware”. In Pervasive Computing, IEEE, Vol 1, Issue 1, pp. 36 - 47.
  17. Weiser, M., 1999. “The computer for the 21st century”, In ACM SIGMOBILE Mobile Computing and Communications Review, vol 3, ACM, pp. 3 - 11.
  18. Yang, H., Jansen, E. and Helal, S., 2006. “A Comparison of Two Programming Models for Pervasive Computing”. In SAINT Workshops 2006, International Symposium on Applications and the Internet, IEEE, pp134 - 137.
  19. Zimmermann, A., Lorenz, A. and Specht, M., 2005. “Applications of a Context-Management System”, In Modeling and Using Context, Springer Berlin/ Heidelberg, pp 556-569.
Download


Paper Citation


in Harvard Style

Al Kukhun D. and Sèdes F. (2007). INTEROPERABILITY IN PERVASIVE ENTERPRISE INFORMATION SYSTEMS - A Double-Faced Coin between Security and Accessability . In Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-972-8865-90-0, pages 237-242. DOI: 10.5220/0002396502370242


in Bibtex Style

@conference{iceis07,
author={Dana Al Kukhun and Florence Sèdes},
title={INTEROPERABILITY IN PERVASIVE ENTERPRISE INFORMATION SYSTEMS - A Double-Faced Coin between Security and Accessability},
booktitle={Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2007},
pages={237-242},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002396502370242},
isbn={978-972-8865-90-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - INTEROPERABILITY IN PERVASIVE ENTERPRISE INFORMATION SYSTEMS - A Double-Faced Coin between Security and Accessability
SN - 978-972-8865-90-0
AU - Al Kukhun D.
AU - Sèdes F.
PY - 2007
SP - 237
EP - 242
DO - 10.5220/0002396502370242