Workshop on Personal and Institutional Security
As more and more mobile computing environments are deployed, as more of us carry with us evermore powerful digital devices capable of high speed communications, fast computations and huge storage, the landscape of physical as well as data vulnerability is changing rapidly, having far reaching implications to personal as well as institutional security. The goal of this workshop is to explore the new challenges to security posed by the environments of tomorrow.
In a mobile environment a person has the flexibility of working from any location and even conducting business while one is on the move. However, a loss of a device or other compromise to one’s physical security may not only cause physical harm but may also permit ready access to the digital devices threatening the security of personal or financial data as well as possible access to the institutional systems. By recognizing these security needs, we may design systems which support secure operations while improving personal and institutional security. For example, by incorporating localization technologies in digital devices we may track the location of the device/person carrying it, thereby improving the physical security. Of course, the collection of the location information has to be done carefully so that the personal freedom and privacy concerns of the individual are not jeopardized. Location information can also be used to improve the institutional security by having location as another important factor to take into account as a part of the overall security architecture and policies.
In this workshop several experts will present their points of view on the subject. The goal will be to identify the areas requiring further attention in support of personal and institutional security.
Participant will be given the opportunity to present a short
position statement followed by discussion and the production of a white paper
covering the applications and needs for personal and institutional
security. You may prepare up to 5 slides
and expect up to 10 minutes for your position statement, to be presented after
the main presenters and before discussion.
Why Conventional Security Techniques Are Not Sufficient for MUM Environments?
Jon Agre – Fujitsu Laboratories
Kirstie Bellman – Aerospace Corporation
John Rodgers –
Anne Tsao - Algotek Inc.
Tony Fescenda – Koolspan
8:30 am Welcome
bYOB (Build Your Own Bag): A Computationally-Enhanced
Modular Textile System, Gauri Nanda, Adrian Cable, Moneta Ho, Han Hoang, Massachusetts Institute of Technology
Alternate Feature Location for Rapid Navigation Using a 3D Map on a
Mobile Device, Maximino Bessa, António
e Alto Dou;Alan Chalmers,
Exploring the Potentials of Combining Photo Annotating Tasks with
Instant Messaging Fun,Yuechen Qian, Loe M.G.
Pocket PhotoMesa: A Zoomable Image Browser for PDAs,
Amir Khella, Benjamin B. Bederson,
11:00-12:30 Gaming and Graphics
Enabling Fast and Effortless Customisation in Accelerometer Based Gesture Interaction, Jani Mäntyjärvi, Juha Kela, Panu Korpipää, and Sanna Kallio, VTT Electronics
Road Rager - Making Use of Traffic Encounters in a
UMAR - Ubiquitous
Platform: High-Performance Cross-Platform Graphics on
STORY: Extracting stories from heterogeneous information sources and delivering them to heterogeneous devices
2:30-3:30 Software and Architectures
Middleware Design Issues for Mobile and Ubiquitous Computing,
Tatsuo Nakajima, Kaori
Fujinami, Eiji Tokunaga, Hiroo Ishikawa,
Plug-and-Play Application Protocol as the Next Step in the Peer-to-Peer
Evolution, Erkki Harjula,
Mika Ylianttila, Jussi Ala-Kurikka, Jaakko Sauvola MediaTeam Oulu Group; Jukka Riekki,
Survey on Requirements and Solutions of Ubiquitous Software,
Eila Niemelä and
Juhani Latvakoski, VTT Technical Research
Poster and Demo Overviews
Posters and Demos
6:00 Tour of
7:30 Conference Dinner – 94th Aero Squadron
8:30-10:00 Context Awareness
Utilizing Context-Awareness in Office-Type Working Life
Ville-Mikko Rautio, Leena Arhippainen,
Towards Connectivity Management Adaptability: Context Awareness in Policy Representation and End-to-end Evaluation Algorithm
Jun-Zhao Sun, Jukka
Riekki, Jaakko Sauvola, and Marko Jurmu,
Usage Patterns of FriendZone – Mobile Location-Based Community Services
Asaf Burak, Carnegie Mellon; Taly Sharon, Massachusetts Institute of Technology
11:00 – 12:30 Media Analysis
Fast Watermark Detection Scheme for Camera equipped
Cellular Phone, Takao Nakamura, Atsushi Katayama,
Masashi Yamamuro, Noboru Soneharay, National Institute of Informatics
New High-speed Frame Detection Method: Side Trace Algorithm
(STA) for i-appli on Cellular Phones to Detect Watermarks,
Atsushi Katayama, Takao Nakamura , Masashi Yamamuro,
NTT Cyber Space Laboratories; Noboru Sonehara,
Automatic Video Production of Lectures Using an Intelligent and Aware Environment, Michael Bianchi, Foveal Systems
A Novel Video Coding Scheme for
Wang, Houqiang Li, University of Science
& Technology of
Chang Wen Chen, Florida Institute of Technology
Keynote Speaker: Prof. Brad
Myers, Mobile Devices for Control of Ubiquitous Multimedia,
Utilising Context Ontology in
Personalisation, Panu Korpipää, Juha Kela, VTT Electronics; Jonna Häkkilä, Sami Ronkainen, Ilkka Känsälä, Nokia Corporation
Design and Evaluation of
mProducer: a Mobile Authoring Tool for Personal Experience Computing, James Chao-Ming Teng, Chon-In Wu, Yi-Chao
Chen, Hao-hua Chu, Jane Yung-jen Hsu,
Mobile Kärpät – A Case Study in Wireless Personal Area Networking,
Timo Ojala, Jani Korhonen, Tiia Sutinen, Pekka Parhi and Lauri Aalto,
Configuring Gestures as Expressive Interactions to Navigate Multimedia Recordings from Visits on Multiple Projections,
IP Network for Emegency Services, K.K.A. Zahid, L. Jun, K. Kazaura,
and M. Matsumoto,
Mobile Multimedia Services Development,
J. Karvonen and J. Warsta,
User Experiences on Multimedia Messaging Services Enabled Location Based Application Functionality, J. Hakkila, Nokia Corp., and J. Mantyjarvi, VTT Electronics
Digital Rights Management & Protecting the Digital Media Value Chain,
M.L. Smith, HumanCentric Technologies, Inc.
Bandwidth Optimization by Reliable-Path
Determination in Mobile Ad-Hoc Networks, S. Raghavan, S. Akkiraju and S.
atMOS: Self Expression Movie Generating
System for 3G Mobile Communication, S.
Tokuhisa, T. Kotabe and M. Inakage,
Challenges of Wireless and
Encourages the Mobile Phone Development,
T. Hori and M. Matsumoto,
Context-Aware Middleware for
J. Riekki, V.M. Rautio and J. Sun,
Milddleware Support for Implementing Context-Aware Multimodal User Interfaces, P. Repo and J. Riekki, Infotech Oulu
An Efficient Method for Mutiple Compressed
Audio Streams Spatialization, A. B.
Touimi, M. Emerit,
Digital Photo Similarity Analysis in
Frequency Domain and Photo Album Compression, Y. Lu, T-T. Wong and P.-A.
Multiple Embedding Using Robust Watermarks
for Wireless Medical Images, D. Osborne, D. Abbott, M. Sorrell and D.
Mutlimodal Interfaces in Wireless Computing, J. Cohen, M. Genser, CTO Voice Signal (No paper submission)
Task Computing, Z. Song, R. Masuoka, Y. Labrou, Fujitsu Laboratories of America, Inc.
Data Gathering in Sensor Networks, K.V. Natarjan, M.V.V. Murthy,
Ambient Utility Games – New Motivators in developing game genres, S. Kangas, Technical Research Centre of Finland, and O. Caven-Pysa, Lappeenranta University of Technology (No paper submission)
Wohemia: A Location-Based Story and Scavenger Hunt for internet-Capable