跳到主要內容

臺灣博碩士論文加值系統

(44.200.194.255) 您好!臺灣時間:2024/07/24 05:06
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:王忍成
研究生(外文):Reen-Cheng Wang
論文名稱:使用者導向之普及運算
論文名稱(外文):User Centric Ubiquitous Computing
指導教授:張瑞雄張瑞雄引用關係
指導教授(外文):Ruay-Shiung Chang
學位類別:博士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:英文
論文頁數:145
中文關鍵詞:普及運算使用者導向
外文關鍵詞:pervasive computinguser-centricubiquitous computing
相關次數:
  • 被引用被引用:0
  • 點閱點閱:281
  • 評分評分:
  • 下載下載:44
  • 收藏至我的研究室書目清單書目收藏:1
Ubiquitous computing is the trend of future life, which means anyone can use anything to access any service at anytime no matter where he/she is. Under this vision, many technologies should be developed and applied to satisfy people’s desire. However, behind these technologies, one of the important concerns is user-centricity. Novel technologies should always help people with usage transparency. That is to say, technologies must accommodate human’s common actions rather than the other way around. In this dissertation, two major approaches are proposed to accomplish the purpose. The first one is to think from user sides, which includes semantic approach and user-centric identification. Semantic communication is human’s nature. A semantic service discovery methodology is proposed in the dissertation. Also, user identification is important. A process of identifying user through common behaviors model is addressed with the consideration of keeping user anonymous (which means information can not be associated with a user at all), pseudonymous (which means transactions can be linked to a pseudonym but not to a particular individual, e.g. nicknames), or veronymous (which means the user is revealed and proven as real identity). The other one involves several technical improvements, which makes pervasive environment more efficient and feasible. These refinements comprise internetworking between heterogeneous network environments and protocols, and an enhancement of performance while roaming. In accordance with the globalization of ubiquitous environment, IPv6 is a proper core of communication. For this, in compliant with widely separated IPv4 network, the transition mechanisms from IPv4 to IPv6 are examined and evaluated. A cooperating model between IP-based and non-IP-based networks is presented for the cross realm ubiquitous networks. The example scenario is an integration of ZigBee/802.15.4 and IPv6/802.3 networks. For enhancing the performance with Mobile IPv6, a cross-layer mechanism in proposed. All of these are focused on one aspect – construct a user-centric ubiquitous computing prospect.
LIST OF FIGURES iv
LIST OF TABLES vi
1. INTRODUCTION 1
1.1 MOTIVATION 1
1.2 OBJECTIVE AND SCOPE 2
1.3 CONTRIBUTIONS OF THE WORK 3
2. TERMINOLOGY 7
3. BACKGROUND AND RELATED WORKS 13
3.1 SERVICE DISCOVERY INFRASTRUCTURES 19
3.1.1 Bluetooth 19
3.1.2 Jini 20
3.1.3 Salutation 21
3.1.4 Service Location Protocol 21
3.1.5 Universal Plug and Play 22
3.1.6 Zero Configuration Networking 23
3.2 ONTOLOGY LANGUAGES 24
3.2.1 XHTML-based ontology languages 24
3.2.2 XML-based ontology languages 25
3.3 USER IDENTITY MANAGEMENT MODELS 26
3.3.1 Classical user identity management models 26
3.3.2 Centralized user identity models 28
3.3.3 Federated user identity models 30
3.4 THE TRANSITION OF DIFFERENT PROTOCOLS 33
3.4.1 IPv4/IPv6 dual-stack mechanism 34
3.4.2 IPv4/IPv6 tunneling mechanisms 35
3.4.3 IPv4/IPv6 translation mechanisms 38
3.5 THE INTEROPERABILITY OF DIFFERENT NETWORKS 39
3.5.1 IPv6 over ZigBee 41
3.5.2 6LoWPAN 41
3.5.3 IP-Net 42
3.5.4 Sakane’s translation mechanism 42
3.6 THE MOBILITY SUPPORT FUNCTION 43
3.6.1 Movement detection and router discovery 44
3.6.2 Address configuration 45
3.6.3 MIPv6 registrations 46
3.7 THE MECHANISMS OF WIRELESS TCP PERFORMANCE ENHANCEMENTS 47
3.7.1 Link-layer solution 48
3.7.1 Split connection. 49
3.7.2 TCP modification 50
3.7.3 Cross-Layer approach 52
4. NOVEL USER-CENTRIC APPROACHES 55
4.1 SEMANTIC SERVICE DISCOVERY 55
4.1.1 Design of semantic service discovery protocol 55
4.1.2 Evaluating service registration with service discovery protocols 58
4.1.3 Evaluating service registration with ontology languages 60
4.1.4 Evaluating user request and service access with flexibility 61
4.1.5 Evaluating user request and service access with query languages 62
4.2 USER CENTRIC IDENTIFY MANAGEMENT 67
4.2.1 Novel credential based federated user identification method 67
4.2.2 ID credential management 70
4.2.3 Service credential management 74
4.2.4 Verification of the design 77
5. TECHNICAL IMPROVEMENTS FOR UBIQUITOUS COMPUTING 81
5.1 TRANSITION IN DIFFERENT PROTOCOLS 81
5.1.1 Configured-tunnel architecture 81
5.1.2 6to4-tunnel architecture 83
5.1.3 Tunnel broker architecture 84
5.1.4 Performance analysis 86
5.2 THE INTEGRATION OF HETEROGENEOUS NETWORKS 92
5.2.1 The overlay internetworking design 92
5.2.2 The proposed transmission flows 95
5.3 TRANSMISSION IMPROVEMENT WITH CROSS-LAYER MECHANISM 102
5.3.1 The effect of TCP in wireless environment 102
5.3.2 The Cross-Layer Binding Update Mechanism 104
5.3.3 Theoretical Analysis 106
5.3.4 Simulation results 108
6. CONCLUSIONS 117
REFERENCES 121
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J. and Levkowetz, H., “Extensible Authentication Protocol (EAP)”, IETF RFC 3748, 2004.
Allman, M., Paxson, V. and Stevens, W., “TCP Congestion Control”, IETF RFC 2581, 1999.
Amaya, URL: http://www.w3.org/Amaya/
Anderson, R., “The classification of hash functions”, Proceedings of the IMA Conference in Cryptography and Coding, pp. 83-94, 1993.
Aoun, C. and Davies, E., “Reasons to Move the Network Address Translator - Protocol Translator (NAT-PT) to Historic Status”, IETF RFC 4966, 2007.
Arkko, J., Eronen, P., Nikander, P. and Torvinen, V., “Secure and Efficient Network Access”, Extended abstract presented in the DIMACS Workshop on Mobile and Wireless Security, Piscataway, NJ, USA, 2004.
Armitage, G., Schulter, P. and Jork, M., “IPv6 over ATM Networks”, IETF RFC 2492, 1999.
Avancha, S., Joshi, A. and Finin, T., “Enhancing the Bluetooth Service Discovery Protocol”, IEEE Computer, vol. 35, no. 6, pp. 96-99, 2002.
Badrinath, B. R. and Bakre, A., “I-TCP: Indirect TCP for Mobile Hosts”, Proceedings of the 15th International Conference on Distributed Computing Systems, pp. 136-143, 1995.
Balakrishnan, H., Seshan, S., Amir, E. and Katz, R. H., “Improving TCP/IP Performance over Wireless Networks”, Proceedings of the 1st ACM/IEEE International Conference on Mobile Computing and Networking, pp. 2-11, 1995.
Beckett, D., “RDF/XML Syntax Specification”, W3C Recommendation, 2004.
Bell, D. E. and LaPadula, L. J, “Secure Computer Systems: Mathematical Foundations”, MITRE Technical Report 2547, 1973.
Bellare, M., Kilian, J. and Rogaway, P., “The Security of Cipher Block Chaining”, Lecture Notes in Computer Science, vol. 839, pp. 341-358, 1994.
Bellare, M., Kilian, J. and Rogaway, P., “The Security of the Cipher Block Chaining Message Authentication Code”, Journal of Computer and System Sciences, vol. 61, no. 3, pp. 362-399, 2000.
Bellavista, P., Corradi, A., Montanari, R. and Stefanelli, C., “Context-Aware Middleware for Resource Management in the Wireless Internet:, IEEE Transaction on Software Engineering, vol. 29, no. 12, pp. 1086-1099, 2003
Bellovin, S. and Merritt, M. “Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks”, Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp.72-84, 1992.
Bernaschi, M., Cacace, F., Iannello, G., Za, S. and Pescape, A., “Seamless Internetworking of WLANs and Cellular Networks: Architecture and Performance Issues in a Mobile IPv6 Scenario”, IEEE Wireless Communications, vol. 12, no. 3, pp. 73-80, 2005.
Berners-Lee, T., Connolly, D. and Hawke, S., “Semantic Web Tutorial Using N3”, Tutorial at the 12th International WWW Conference, Budapest, Hungary, 2003.
Biaz S. and Vaidya N, “TCP over Wireless Networks using Multiple Acknowledgements”, Technical Report 97-001, Texas A&M University, 1997.
Bertocci, V., Serack, G. and Baker, C., “Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities”, Addison-Wesley, 2007.
Bluetooth SIG, “Bluetooth Specification Version 2.0 + EDR”, 2004
Brickley, D. and Guha, R. V., “RDF Vocabulary Description Language 1.0: RDF Schema”, W3C Recommendation, 2004.
Broeskstra, J. and Kampman, A., “SeRQL: A Second Generation RDF Query Language”, SWAD-Europe Workshop on Semantic Web Storage and Retrieval, Amsterdam, Netherlands, 2003.
Brown K. and Singh, S., “M-TCP: TCP for mobile cellular networks”, ACM. SIGCOMM Computer Communications Review, vol. 27, no. 5, pp. 19-42, 1997.
Burr, W. E., Dodson, D. F. and Polk, W. T., “Electronic Authentication Guideline”, NIST Special Publication 800-63, 2006.
Caceres, R. and Iftode, L. “Improving the performance of reliable transport protocols in mobile computing environments”, IEEE Journal on Selected Areas in Communications, vol. 13, no. 5, pp. 850-857, 1995.
Cahill, C., Canales, C., Le-Van-Gong, H., Madsen, P., Maler, E. and Whitehead, G., “Liberty Alliance Web Services Framework: A Technical Overview Version 1.0”, Liberty Alliance Project, 2008.
Cai, M. and Frank, M., “RDFPeers: A Scalable Distributed RDF Repository based on A Structured Peer-to-Peer Network”, Proceeding of the 13th International WWW Conference, pp. 650-657, New York, USA, 2004.
Calhoun, P., Loughney, J., Guttman, E., Zorn, G. and Arkko, J., “Diameter Base Protocol”, IETF RFC 3588, 2003.
Cameron, K., “Laws of Identity”, 2005, URL: http://www.identityblog.com/?p=354
Carpenter, B. and Jung, C., “Transmission of IPv6 over IPv4 Domains without Explicit Tunnels”, IETF RFC 2529, 1999.
Carrel, D. and Grant, L., “The TACACS+ Protocol Version 1.78”, IETF Internet-draft draft-grant-tacacs-02.txt, 1997.
Chakraborty, D., Perich, F., Avancha, S. and Joshi, A., “DReggie: Semantic Service Discovery for M-Commerce Applications”, Workshop on Reliable and Secure Applications in Mobile Environment, 2001.
Chandra, R., Mehrotra, S., and Venkasubramanian, N., “Pvault: A Client Server System Providing Mobile Access to Personal Data”, Proceedings of the 2005 ACM workshop on Storage security and survivability (StorageSS), pp. 123-129, 2005.
Chang, Y. C., Wang, R. C., Chao, H. C. and Chen, J. L., “Performance Investigation of IPv4/IPv6 Transition Mechanisms”, Journal of Internet Technology, vol. 5, no. 2, pp. 163-170, 2004.
Chaudhri, V. K., Farquhar, A., Fikes, R., Karp, P. D. and Rice, J. P., “Open Knowledge Base Connectivity 2.0”, Technical Report KSL-98-06, Knowledge System Laboratory, Stanford University, 1998
Chaum, D. “Security Without Identification: Transaction Systems to Make Big Brother Obsolete”, Communications of the ACM, Vol. 28, No. 10, pp. 1035-1044, 1985.
Cheshire, S. and Krochmal, M., “DNS-Based Service Discovery”, IETF Internet Draft draft-cheshire-dnsext-dns-sd-04.txt, 2006.
Cheshire, S. and Krochmal, M., “Multicast DNS”, IETF Internet Draft draft-cheshire-dnsext-multicastdns-06.txt, 2006.
Choi, J., Shin, O. and Haddad, W., “Fast Router Discovery with L2 Support”, IETF Internet Draft draft-ietf-dna-frd-02.txt, 2006.
Choi, J. and Nordmark, E., “DNA with Unmodified Routers: Prefix List Based Approach”, IETF Internet Draft draft-ietf-dna-cpl-02.txt, 2006.
Christensen, M., Kimball, K. and Solensky, F., “Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Snooping Switches”, IETF RFC 4541, 2006.
Clement, L., Hately, A., Riegen, C. V. and Rogers, T., “UDDI Version 3.0.2(draft)”, UDDI Spec Technical Committee, 2004.
Conta, A., Malis, A. and Mueller, M., “Transmission of IPv6 Packets over Frame Relay Networks Specification”, IETF RFC 2590, 1999.
Crawford, J. M. and Kuipers, B. J., “Algernon -- a tractable system for knowledge representation”, ACM SIGART Bulletin, vol. 2, no, 3, pp. 35-44, 1991.
Crawford, M., “Transmission of IPv6 Packets over Ethernet Networks”, IETF RFC 2464, 1998.
Crawford, M., “Transmission of IPv6 Packets over FDDI Networks”, IETF RFC 2467, 1998.
Daley, G., Pentland, B. and Nelson, R., “Effects of Fast Routers Advertisement on Mobile IPv6 Handovers”, Proceedings of the 8th IEEE Symposium on Computers and Communications, pp. 557-562, 2003.
Daley, G., Pentland, B., and Nelson, R. “Movement Detection Optimizations in Mobile IPv6”, Proceedings of the 11th IEEE International Conference on Networks, pp. 687-692, 2003.
Damgard, I. B., “Collision free hash functions and public key signature scheme”, Lecture Notes in Computer Science, vol. 304, pp. 203-216, 1987.
DAML, URL: http://www.daml.org/
Davies, J., “Introduction to IP version 6”, Microsoft Cooperation, 2002.
Decker, S., Sintek, M., Billig, A., Henze, N., Dolog, P., Nejdl, W., Harth, A., Leicher, A., Busse, S., Ambite, J. L., Weathers, M., Neumann, G. and Zdun, U., “TRIPLE - an RDF Rule Language with Context and Use Cases”, W3C Workshop on Rule Languages for Interoperability, Washington, D.C., USA, 2005..
Deering, S. and Hinden, R., “Internet Protocol version 6 Specification”, IETF RFC 2460, 1998.
Diffie, W. and Hellman, M.E., “New Directions in Cryptography”, IEEE Transactions on Information Theory, vol. IT-22, pp. 644-654, 1976.
Dogac, A., Kabak, Y. and Laleci, G. B., “Enriching ebXML Registries with OWL Ontologies for Efficient Service Discovery”, Proceeding of 14th International Workshop on Research Issues on Data Engineering, pp. 69-76, 2004.
Droms, R. Ed., Bound, J., Volz, B., Lemon, T., Perkins, C. and Carney, M. “Dynamic Host Configuration Protocol for IPv6 (DHCPv6)”, IETF RFC 3315, 2003.
Dunn, T., “The IPv6 Transition”, IEEE Internet Computing, vol.6, no.3, pp. 11-13, 2002.
Durand, A., Fasano, P., Guardini I. and Lento, D., “IPv6 Tunnel Broker”, IETF RFC 3053, 2001.
Edwards, W. K., “Discovery Systems in Ubiquitous Computing”, IEEE Pervasive Computing, vol. 5, no. 2, pp. 70-77, 2006.
Esaki, H., Kato, A. and Murai, J., “R&D Activities and Testbed Operation in WIDE Project”, Proceedings of 2003 Symposium on Applications and the Internet, pp.172-177, 2003.
Farquhar, A., Fikes, R. and Rice, J., “The Ontolingua Server: a tool for collaborative ontology construction”, International Journal of Human-Computer Studies, vol. 46, no. 6, pp. 707-727, 1997.
Farrell, S. Ed., “Securely Available Credentials Protocol”, IETF RFC 3767, 2004.
Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., and Stewart, L., “HTTP Authentication: Basic and Digest Authentication”, IETF RFC 2617, 1999.
Fu, C. P. and Liew, S. C., “TCP Veno: TCP Enhancement for Transmission Over Wireless Access Networks”, IEEE Journal on Selected Areas in Communication, vol. 21, no. 2, pp. 216-227, 2003.
Gerla, M., Sanadidi, M.Y., Ren Wang, Zanella, A., Casetti, C. and Mascolo, S., “TCP Westwood: congestion window control using bandwidth estimation”, Proceedings of the IEEE Global Telecommunications Conference, pp. 1698-1702, 2001.
Gómez-Pérez, A. and Corcho, O., “Ontology Languages for the Semantic Web”, IEEE Intelligent Systems, vol. 17, no. 1, pp. 54-60, 2002.
Greenfield, A., “Everyware: the Dawning Age of Ubiquitous Computing”, New Riders Publishing, 2006.
Guttman, E., “Vendor Extensions for Service Location Protocol, Version 2”, IETF RFC 3224, 2002,
Guttman, E., Perkins, C., Veizades, J. and Day, M., “Service Location Protocol Version 2”, IETF RFC 2608, 1999.
Hagen, S., “IPv6 Essentials”, O'Reilly, 2002.
Hain, T., Durand, A. and Wasserman, M., “Next Generation Transition Charter”, URL: http://www.ietf.org/html.charters/OLD/ngtrans-charter.html, 2003.
Heflin, J., Hendler, J. and Luke, S., “SHOE: A Knowledge Representation Language for Internet Applications”, Technical Report CS-TR-4078, University of Maryland, College Park, 1999.
Herzberg, A. and Jbara, A. “Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks”, to be published in IEEE Transactions on Internet Technology, vol. 8, no. 4, 2008.
Helal, S., “Standards for Service Discovery and Delivery”. IEEE Pervasive Computing, vol. 1, no. 3, pp. 95-100, 2002.
Holbrook, H., Cain, B. and Haberman, B., “Using Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Protocol Version 2 (MLDv2) for Source-Specific Multicast”, IETF RFC 4604, June 2006
Hsieh, R., Seneviratne, A., Soliman, H. and El-Malki, K., “Performance analysis on Hierarchical Mobile IPv6 with Fast-handoff over End-to-End TCP”, Proceedings of the IEEE Global Telecommunications Conference 2002, pp.2488-2492, 2002.
Hinden, R., and Deering, S., “IP Version 6 Addressing Architecture”, IETF RFC 4291, 2006.
Huitema, C., “An Anycast Prefix for 6to4 Relay Routers”, IETF RFC 3068, 2001.
IEEE, “Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)”, IEEE Standard 802.15.4-2003, Part 15.4, 2003.
IEEE, “IEEE Standard for Local and Metropolitan Area Networks: Port-Based Network Access Control”, IEEE Standard 802.1X, 2004.
IEEE, “Guidelines for 64-bit Global Identifier (EUI-64) Registration Authority”, 2004.
IEEE, “Draft IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services”, Draft IEEE Standard P802.21/D11.0, 2008.
IPv6 Forum, URL: http://www.ipv6forum.com/
Jablon, D. “Strong Password-Only Authenticated Key Exchange”, Computer Communication Review, vol. 26, no. 5, pp. 5-26, 1996.
Jaiswal, S. and Nandi, S., “Simulation-based Performance Comparison of TCP-variants Over Mobile IPv6 based Mobility Management Schemes”, Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, pp. 284-291, 2004.
Jing, Z. and Zhisheng, N., “A Reliable TCP-Aware Link Layer Retransmission for Wireless Networks”, Proceedings of International Conference on Communication Technology 2000, pp. 900-905, 2000.
Jini Community, “Jini Discovery and Join Specification Version 3.0”, 2006.
Johnson, D., Perkins, C. E. and Arkko J., “Mobility Support in IPv6”, IETF RFC 3775, 2004.
Josang, A. and Pope, S., “User Centric Identity Management”, Proceedings of AusCERT, Gold Coast, 2005.
Karayannis, G., “IPv6 over IEEE 802.15.4”, IETF 61st meeting presentation, 2004.
Karp, R., Chaudhri, V. and Thomere, J., “XOL: An XML-Based Ontology Exchange Language (version 0.4)”, URL: http://www.ai.sri.com/~pkarp/xol, 1999.
Karvounarakis, G., Alexaki, S., Christophides, V., Plexousakis, D. and Scholl, M., “RQL: A Declarative Query Language for RDF”, Proceedings of the 11th international conference on World Wide Web, pp. 592-603, 2002.
Khare, R., “Microformats: the next (small) thing on the semantic Web?”,. IEEE Internet Computing, vol. 10, no. 1, pp. 68-75, 2006.
Kifer, M., Lausen, G. and Wu, J., „Logical foundations of object oriented and frame-based languages”, Journal of the ACM, vol. 42, no. 4, pp. 741-843, 1995.
Koodli, R. Ed., “Fast Handovers for Mobile IPv6”, IETF RFC 4068, 2005.
Kushalnagar, N., Montenegro, G. and Schumacher, C., “IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals”, IETF RFC 4919, 2007.
Lava Software Pty. Ltd., “PasswordVault User Manual”, 2007, http://www.lavasoftware.com/pv/contents.html.
Lee, G. C., Shin, M. K. and Kim, H. J., “Implementing NAT-PT/SIIT, ALGs and Consideration to the Mobility Support in NAT-PT environment”, Proceedings of the 6th International Conference on Advanced Communication Technology, pp. 433-439, 2004.
Lemon, T. and Sommerfield, B, “Node-specific Client Identifiers for Dynamic Host Configuration Protocol Version Four (DHCPv4)”, IETF RFC 4361, 2006.
Licklider, J. C. R. and Taylor, R. W., “The computer as Communication Device”, Science and Technology, pp. 21-31, 1968.
Lucks, S., “Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys”, The Security Protocol Workshop 1997, Proceedings of the Security Protocols Workshop, LNCS 1361, pp.79-90, 1997.
McGuinness, D. L. and Harmelen, F. V. “OWL Web Ontology Language Overview”, W3C Recommendation, 2004.
Microsoft, “Windows Server 2003 Active Directory”, URL: http://www.microsoft.com /windowsserver2003/technologies/directory/activedirectory/default.mspx
Miller, L., Seaborne, A. and Reggiori, A., “Three Implementations of SquishQL, a Simple RDF Query Language”, Proceeding of the First International Conference on Semantic Web, pp. 423-435, 2002.
Mishra, A., Shin, M. H., Petroni, N. L. Jr., Clancy, T. C. and Arbaugh, W. A, “Proactive Key Distribution Using Neighbor Graphs”, IEEE Wireless Communications, vol. 11, no. 1, pp. 26-36, 2004.
Miyakawa, S. and Droms, R., “Requirements for IPv6 Prefix Delegation”, IETF RFC 3769, 2004.
Montavont, N. and Noel, T., “Handover Management for Mobile Nodes in IPv6 Networks”, IEEE Communications Magazine, vol. 40, no. 8, pp. 38-43, 2002.
Montenegro, G., Kushalnagar, N., Hui, J. and Culler, D., “Transmission of IPv6 Packets over IEEE 802.15.4 Networks”, IETF RFC 4944, 2007.
Moore, N. and Daley, G., “Fast Address Configuration Strategies for the Next-Generation Internet”, Australian Telecommunications, Networks and Applications Conference, Southbank, Melbourne, 2003.
Moore, N. “Optimistic Duplicate Address Detection for IPv6”, IETF RFC 4429, 2006.
MozillaRdf, URL: http://www.mozilla.org/rdf/doc/
Nanda A., “Identity Selector Interoperability Profile V1.0”, Microsoft Corporation, 2007.
Narayanan, S. Ed., “Detecting Network Attachment in IPv6 Networks (DNAv6)”, IETF Internet Draft draft-ietf-dna-protocol-07.txt (work in progress), 2008.
Narten T., Draves, R., and Krishnan, S., “Privacy Extensions for Stateless Address Autoconfiguration in IPv6’, IETF RFC 4941, 2007.
Narten, T., Nordmark, E., Simpson, W. and Soliman H., “Neighbor Discovery for IP version 6 (IPv6)”, IETF RFC 4861, 2007.
Nejdl, W., Wolpers, M., Siberski, W., Schmitz, C., Schlosser, M., Brunkhorst, I. and Loser, A., “Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks”, Proceeding of the 12th International WWW Conference, pp. 536-543, 2003.
Neuman, C., Yu, T., Hartman, S. and Raeburn, K., “The Kerberos Network Authentication Service (V5)”, IETF RFC 4120, 2005.
Newman, P., Lyon, T. and Minshall, G. “Flow Labelled IP: A Connectionless Approach to ATM”, Proceedings of the 15th Annual Joint Conference of the IEEE Computer Societies. Networking the Next Generation (INFOCOM '96), pp. 1251-1260, 1996.
Nikander, P., Arkko, J., Aura, T., Montenegro, G. and Nordmark, E., “Mobile IP Version 6 Route Optimization Security Design Background”, IETF RFC 4225, 2005.
Nordmark, E., “Stateless IP/ICMP Translation Algorithm (SIIT)”, IETF RFC 2765, 2000.
Nordmark E. and Gilligan, R., “Basic Transition Mechanisms for IPv6 Hosts and Routers”, IETF RFC 4213, 2005.
Novotny, J., Tuecke, S. and Welch, V., “An Online Credential Repository for the Grid: MyProxy”, Proceedings of the 10th International Symposium on High Performance Distributed Computing (HPDC-10), pp. 104-111, 2001.
nsnam, URL: http://www.isi.edu/nsnam
OASIS, “Conformance Requirements for the OASIS Security Assertion Markup Language (SAML) V2.0”,OASIS Standards, 2005.
OASIS/ebXML Registry Technical Committee, “OASIS/ebXML Registry Information Model v2.0”, 2001.
Oberle, D., Volz, R., Staab, S. and Motik, B., “An Extensible Ontology Software Environment”, Handbook on Ontologies, pp. 299-320, Springer, 2004.
Ogbuji, C., “Versa: Path-Based RDF Query Language”, O'Reilly XML.com, URL: http://www.xml.com/pub/a/2005/07/20/versa.html, 2005.
OIL, URL: http://www.ontoknowledge.org/oil/index.shtml
OilEd, URL: http://oiled.man.ac.uk/
Olson, M. and Ogbuji, U., “Versa Specification”, URL: http://copia.ogbuji.net/files/Versa.htm , 2002.
OntoEdit, URL: http://www.ontoknowledge.org/tools/ontoedit.shtml
OntoStudio, URL: http://www.ontoprise.de/
OpenID Foundation, “OpenID Authentication 2.0”, OpenID Specifications, 2007.
OpenID libraries, URL: http://wiki.openid.net/Libraries
OpenLiberty, URL: http://openliberty.org/
Ortiz S. Jr., “Internet Telephony Jumps off the Wires”, IEEE Computer, vol. 37, no. 12, pp. 16-19, 2004.
Pan, J. Z., Franconi, E., Tessaris, S., Glimm, B., Siberski, W., Stamou, G., Tzouvaras, V., Horrocks, I., Li, L. and Wache, H., “Report on Query Language Design and Standardization”, Technical report, The Knowledge Web project, 2004.
Paolucci, M., Kawamura, T., Payne, T. and Sycara, K., “Importing the Semantic Web in UDDI”, Lecture Notes in Computer Science, vol. 2512, pp, 225-236, 2002.
Parsa, C. and Garcia-Luna-Aceves, J. J., “TULIP: A Link-Level Protocol for Improving TCP over Wireless Links”, Proceedings of IEEE Wireless Communications and Networking Conference 1999, pp. 1253-1257, 1999.
Pashalidis, A. and Mitchell, C. J., “A Taxonomy of Single Sign-On Systems”, Lecture Notes in Computer Science, vol. 2727, pp. 249-264, 2003.
Paxson, V. and Allman, M “Computing TCP's Retransmission Timer”, IETF RFC 2988, 2000.
Perkins, C. Ed., “IP Mobility Support for IPv4”, IETF RFC 3344, 2002.
Perlman, R. and Kaufman, C., “PDM: A new Strong Password-based Protocol”, Proceedings of the 10th conference on USENIX Security Symposium, pp. 23-23, 2001.
Perlman, R. and Kaufman, C., “User-centric PKI”, Proceedings of the 7th Symposium on Identity and Trust on the Internet, pp.59-71, 2008.
Postel, J. Ed., “Internet Protocol”, IETF RFC 791, 1981.
Protégé, URL: http://protege.stanford.edu/
Protégé-OWL, URL: http://protege.stanford.edu/overview/protege-owl.html
Prud'hommeaux, E., “Algae RDF Query Language”, World Wide Web Consortium, URL: http://www.w3.org/2004/05/06-Algae/, 2004.
Prud'hommeaux, E. and Seaborne, A., “SPARQL Query Language for RDF”, W3C Recommendation, 2008.
Raicu, I. and Zeadally, S., “Impact of IPv6 on End-user Applications”, Proceedings of the 10th International Conference on Telecommunications, pp. 973-980, 2003.
Ramani, R. and Karandikar, A., “Explicit Congestion Notification (ECN) in TCP over Wireless Network”, Proceedings of the IEEE International Conference on Personal Wireless Communications 2000, pp. 495-499, 2000.
Richard, F., Patrick, H. and Ian, H., “OWL-QL - A Language for Deductive Query Answering on the Semantic Web”, Journal of Web Semantics, vol. 2, no. 1, pp. 19-29, 2005.
Richard, G. G., “Service Discovery: Protocols and Programming”, McGraw-Hill Professional, 2002.
Rigney, C., Willens, S., Rubens, A. and Simpson, W., “Remote Authentication Dial In User Service (RADIUS)”, IETF RFC 2865, 2000.
Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.,“Stronger Password Authentication Using Browser Extensions”, Proceedings of the 14th conference on USENIX Security Symposium, pp. 2-2, 2005.
RSA Data Security, Inc., “Understanding Public Key Infrastructure (PKI)”, RSA Data Security White Paper, 1999.
Sakane, S., Ishii, Y., Toba, K., Kamada, K. and Okabe, N., “A translation method between 802.15.4 nodes and IPv6 nodes”, Proceeding of the International Symposium on Applications and the Internet Workshops 2006 (SAINT 2006), pp. 34-37, 2006.
Salutation Consortium, “Salutation Architecture Specification V2.0c, 1999.
Sandhu, R. S., “Relational Database Access Controls”, Handbook of Information Security Management, pp. 145-160, Auerbach Publishers, 1994.
Seaborne, A., “RDQL - A Query Language for RDF”, URL: http://www.w3.org/Submission/RDQL/, 2004.
Shibboleth, URL: http://shibboleth.internet2.edu/
Shim, S. S. Y., Bhalla, G. and Pendyala, V., “Federated Identity Management”, IEEE Computer, Vol. 38, No. 12, pp. 120-122, 2005.
Simpson, W., “PPP Challenge Handshake Authentication Protocol (CHAP)”, IETF RFC 1994, 1996.
Sinha, P., Nandagopal, T., Venkitaraman, N., Sivakumar, R. and Bharghavan, V., “WTCP: A Reliable Transport Protocol for Wireless Wide-Area Networks”, Wireless Networks, vol. 8, no. 2/3, pp. 301-316, 2002.
Soliman, H., Castelluccia, C., El Malki, K. and Bellier, L., “Hierarchical Mobile IPv6 Mobility Management (HMIPv6)”, IETF RFC 4140, 2005.
Steinberg, D. and Cheshire, S., “Zero Configuration Networking : The Definitive Guide”, O'Reilly Media Inc., 2005.
Steiner, M., Tsudik, G. and Waidner, M., “Refinement and Extension of Encrypted Key Exchange”, Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995.
Sxipper, URL: http://www.sxipper.com/
Thomson, S. Narten, T. and Jinmei, T., “IPv6 Stateless Address Autoconfiguration”, IETF RFC 4862, 2007.
Toninelli, A., Corradi, A. and Montanari, R., “Semantic-based discovery to support mobile context-aware service access”, Computer Communications, vol. 31, no. 5, pp. 935-949, 2008.
Troan, O. and Droms, R., “IPv6 Prefix Options for Dynamic Host Configuration Protocol (DHCP) version 6”, IETF RFC 3633, 2003.
Tsirtsis, G. and Srisuresh, P., “Network Address Translation - Protocol Translation (NAT-PT)”, IETF RFC 2766, 2000.
Tsuchiya, K., Higuchi, H. and Atarashi, Y., “Dual Stack Hosts using the "Bump-In-the-Stack" Technique (BIS)”, IETF RFC 2767, 2000.
UPnP Forum, “UPnP Device Architecture”, 2000.
Vaidya N. and Mehta M, “Delayed Duplicate Acknowledgements: A TCP-Unaware Approach to Improve Performance of TCP over Wireless Links”, Technical Report 99-003, Texas A&M University, 1999.
Varada, S. Ed., Haskins, D. and Allen, E., “IP Version 6 over PPP’, IETF RFC 5072, 2007.
Varada, S. Ed., “Negotiation for IPv6 Datagram Compression Using IPv6 Control Protocol’, IETF RFC 5172, 2008.
Vecchio, D. D., Humphrey, M., Basney, J. and Nagaratnam, N., “CredEx: User-Centric Credential Management for Grid and Web Services”, Proceedings of the IEEE International Conference on Web Services, pp. 149-156, 2005.
Velayos, H. and Karlsson, G., “Techniques to Reduce IEEE 802.11b MAC Layer Handoff Time”, Technical Report TRITA-IMIT-LCN R 03:02, Royal Institute of Technology, Stockholm, Sweden, 2003.
Vida, R. and Costa, L. Ed., “Multicast Listener Discovery Version 2 (MLDv2) for IPv6”, IETF RFC 3810, 2004.
Vogt, C., “A Comprehensive Delay Analysis for Reactive and Proactive Handoffs with Mobile IPv6 Route Optimization”, Telematics Technical Reports TM-2006-1, Institute of Telematics, Universität Karlsruhe (TH), Germany, 2006.
Vogt, C. and Arkko, J., “Taxonomy and Analysis of Enhancements to Mobile IPv6 Route Optimization”, IETF RFC 4651, 2007.
Vogt, C., Bless, R., Doll, M. and Daley, G., “Analysis of IPv6 Relocation Delays”, Technical Report, Institute of Telematics, Universität Karlsruhe (TH), Germany, 2005.
Waddington D. and Chang, F. “Realizing the Transition to IPv6”, IEEE Communications Magazine, vol.40, no.6, pp. 138-147, 2002.
Wang, K., Yeo A. K. and Ananda, A. L., “DTTS: a Transparent and Scalable Solution for IPv4 to IPv6 Transition”, Proceedings of the tenth International Conference on Computer Communications and Networks, pp. 248-253, 2001.
Wang, R. C., Chen, R. Y. and Chao, H.C., “AAA Architecture for Mobile IPv6 based on WLAN”, International Journal of Network Management, vol. 14, no. 5, pp. 305-313, 2004.
Wang, R. C. and Chang, R. S., “Cross-Layer Binding Update for TCP Performance Enhancement over Mobile IPv6 Networks”, IET Communications, vol. 1, no. 5, pp 924-932, 2007.
Wang, R. C., Chang, R. S. and Chao, H. C., “Internetworking Between ZigBee/802.15.4 and IPv6/802.3 Network”, Proceedings of ACM SIGCOMM 2007 Workshops, pp. 362-367, 2007.
Wang, R. C., Chang, Y. C. and Chang, R. S., “A Semantic Service Approach for Ubiquitous Computing”, to be published in Journal of Intelligent Manufacturing.
Weiser, M., “The Computer for the 21st Century”, Scientific American, vol. 265, no. 3, pp. 94-104, 1991.
Weiser, M. and Brown, J.S., “The Coming Age of Calm Technology”, URL: http://www.ubiq.com/hypertext/weiser/acmfuture2endnote.htm, 1996.
Weiser, M., Gold, R. and Brown, J. S., “The origins of ubiquitous computing research at PARC in the late 1980s”, IBM Systems Journal, vol. 38, no. 4, pp. 693 – 696, 1999.
Windows Passport Network, URL: http://www.passport.net/
Wleklinski, F., “Easy RDF Query Language (eRQL)”, URL: http://www.dbis.informatik.uni-frankfurt.de/~tolle/RDF/eRQL/eRQLDocumentation.html, 2004.
Wu, E. and Chen, M. Z., “JTCP: Jitter-Based TCP for Heterogeneous Wireless Networks”, IEEE Journal on Selected Areas in Communications, vol. 22, no. 4, pp. 757-766, 2004.
Wu, T, “The Secure Remote Password Protocol”, Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, pp.97-111, 1998.
Xu, K., Tian, Y. and Ansari, N., “TCP-Jersey for Wireless IP Communication”, IEEE Journal on Selected Areas in Communications, vol. 22, no. 4, pp. 747-756, 2004.
Yee, K. and Sitaker, K., "Passpet: Convenient password management and phishing protection", Proceedings of the second Symposium on Usable Privacy and Security (SOUPS), pp. 32-43, 2006.
Yuval, G., “How to Swindle Rabin”, Cryptologia, vol. 3, pp. 187-189, 1979.
Zeilenga, K., “Lightweight Directory Access Protocol (LDAP): Technical Specification Road Map”, IETF RFC 4510, 2006.
Zhou, L., Renesse V. and Marsh, M., “Implementing IPv6 as a Peer-to-Peer Overlay Network”, Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems, pp. 347-351, 2002.
Zhu, L. and Tung, B., “Public Key Cryptography for Initial Authentication in Kerberos (PKINIT)”, IETF RFC 4556, 2006.
ZigBee, “ZigBee Specification Version 1.0”, ZigBee Alliance, 2004.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top