glossary - springer978-3-540-30637-5/1.pdf · glossary application ... and performs switching...

26
Glossary Application Programming Interface (API) A set of the specific methods, services, or instructions prescribed by a computer program by which a programmer writing an application program can make reuests of the computer program. q q Authentication Providing assurance that the entity (user, host, and so forth) re esting access is q q the entity that it claims to be. CDMA2000 1x CDMA2000 1x operates in various freuency bands of 450, q q 800, 900, 1700, 1800, 1900, and 2100 MHz, and is fully backward compatible with IS-95. Certificate A digital credential in a public-key cryptography system, which contains the certificate holders name and public key, a serial number, the expiration date of the certificate, and the digital signature of the certificate authority that issued the certificate. Certificate Authority (CA) A trusted entity that is part of a public key infrastructure (PKI) and that creates, issues, and manages certificates for PKI users. Certificate Revocation List (CRL) A list of certificates issued by a certification authority (CA) that are no longer valid. The CRL is maintained and published by the CA. Code Division Multiple Access 2000 (CDMA2000) CDMA2000 is an evolution from IS-95 and isable to support high-rate data over the air interface. CDMA2000 is currently under the standardization of Third- Generation Partnership Project 2 (3GPP2) and is a family of standards. Common Adapter Framework (CAF) It provides a standard API to fetch location information of the target object independent of positioning mechanisms. It defines a common adapter interface intended to shield the details of various positioning systems and provides an adapter implementing this interface for each underlying positioning system. Context Awareness Context awareness refers to the capabilities of a computational system to understand the situation and adjust its behavior accordingly.

Upload: hoangthuan

Post on 08-Mar-2018

216 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Glossary

Application Programming Interface (API)

A set of the specific methods, services, or instructions prescribed by a computer program by which a programmer writing an application program can make reuests of the computer program.qq

Authentication

Providing assurance that the entity (user, host, and so forth) requesting access isqqthe entity that it claims to be.

CDMA2000 1x

CDMA2000 1x operates in various freuency bands of 450, qq 800, 900, 1700, 1800,1900, and 2100 MHz, and is fully backward compatible with IS-95.

Certificate

A digital credential in a public-key cryptography system, which contains the certificate holders name and public key, a serial ’’ number, the expiration date of the certificate, and the digital signature of the certificate authority that issued thecertificate.

Certificate Authority (CA)

A trusted entity that is part of a public key infrastructure (PKI) and that creates,issues, and manages certificates for PKI users.

Certificate Revocation List (CRL)

A list of certificates issued by a certification authority (CA) that are no longer valid. The CRL is maintained and published by the CA.

Code Division Multiple Access 2000 (CDMA2000)

CDMA2000 is an evolution from IS-95 and is able to support high-rate data over the air interface. CDMA2000 is currently under the standardization of Third-Generation Partnership Project 2 (3GPP2) and is a family of standards.

Common Adapter Framework (CAF)

It provides a standard API to fetch location information of the target object independent of positioning mechanisms. It defines a common adapter interface intended to shield the details of various positioning systems and provides an adapter implementing this interface for each underlying positioning system.

Context Awareness

Context awareness refers to the capabilities of a computational system to understand the situation and adjust its behavior accordingly.

Page 2: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

362 Glossa rysa y

Cookie

A file sent by a Web server to a browser and stored by the browser. The cookieincludes a destination address as a URL, possibly with wildcards. When the browser sends any request to a Web server correspoqq nding to the destination address, the browser attaches the cookie to the request. Cookies are used to qqidentify the consumer, especially for repeat access to the same site.

Denial-of-Service Attack (DoS Attack)

In the running of a given protocol, some malicious clients initiate numerousrequests for the connections with se rver, which include numerous statefulqqcookies”““ for a server to maintain. As a result”” , the computation and storage of the server are seriously taken up, the reqest from qq good”““ clients may be refused, and d””the server system may even break down.

Destination-Sequential Distance Vector Routing Algorithm

A table-driven algorithm based on the Bellman–Ford routing mechanism.––

Digital Cash

An electronic form of cash in a cash-like e-payment system with which a personcan make online payment for goods or services purchased over the Internet.

Digital Check

An electronic form of a check in a check-like e-payment system where the checkcan be conveyed across computer networks.

Digital Signature

A digital string produced by applying a cryptographic algorithm with the private-key information on a message/document to authenticate the message/document.

Dynamic Source Routing Algorithm (DSR)

A source-initiated on demand-routing protocol-an alternative to table-driven routing algorithms. DRS creates a route only upon an explicit source-initiatedrequest. qq

Elliptic Curve Cryptography

Elliptic curve cryptography is a branch of public-key cryptography proposed by Victor Miller and Neal Koblitz in the mid-1980s. It is an alternative method to theolder RSA system and offers the relative advantage of higher performance in terms of speed and space usage. This makes it especially suited for implementation on devices with limited computation capability, storage area,dbattery power, and communication bandwidth.

Enhanced Messaging Service (EMS)

It is an application-level extension of SMS for mobile phones available onGSM/GPRS and CDMA networks. EMS now allows users to send text messages

Page 3: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Glossary 363

containing sounds, pictures, and animations. EMS messages that are sent todevices that do not support it will be displayed as SMS transmissions.

ETSI

European Telecommunication Standards Institute

General Packet Radio Service (GPRS)

GPRS is part of ETSI’s GSM Phase 2’’ development to support packet switching++within GSM. It can be upgraded from GSM without extra infrastructure.

Heterogeneity

A remarkable trait of future computing environments. The range of computingdevices is widening continuously, and they dramatically differ in computingcapabilities, including storage, processing power, screen size, networking, to namea few. Such devices would seamlessly interact and coordinate to fulfill a user’s ’’reuirement. Heterogeneity in this sense isqq a double-edged sword. On the onehand, specialties of various devices provide alternatives for different user preferences on the other, the challenge to bridge those devices becomes;imperative.

HyperText Transfer Protocol (HTTP)

Standard transfer protocol used in the Internet, which defines how messages are formatted and transmitted, and what actions Web servers and browsers should takein response to various commands. For example, when entering a URL in a browser, one actually sends an HTTP command to the Web server and instructs it to fetch and transmit the requested Web document. qq

International Mobile Subscriber Identity (IMSI)

In GSM, the user identity is represented by IMSI and is stored in the subscriber identity module (SIM) card. The identity of the MS is represented by theinternational mobile station euipment identity (IMEI). The IMEI is allocated byqqthe euipment manufacturer and registered byqq the network operator. SIM card canbe transferred between mobile stations, user service only relates to the SIM card and is not dependent on a particular MS.t

Interactive MMS (iMMS)

iMMS is a new technology developed by IBM to extend the current MMS standard to enhance its presentation capability and interactive capability, and thereby provide a better user experience than MMS on the mobile phone. Itprovides a mobile workflow middleware and software development kit (SDK) toprovide mobile supports by integrating with existingy workflow applications or developing new workflow applications.

Internet Protocol Security (IPSec)

A set of security functions and options available at the IP level.

Page 4: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

364 Gloss a r ya y

Internet Service Provider (ISP)

A company that provides users with access to the Internet. For a monthly fee, the ISP provides users with a software package, user ID, password, and access phonenumber. Some ISPs also provide users with a modem to enable users to access the Internet.

IS-95

IS-95 was standardized by he USA. IS-95 is also known as CDMA One. IS-95

has two substandards IS-95 A and IS-95 B. IS-95 A is a 2G technology and is:mainly designed for voice communication. IS-95 B can provide higher data ratesby simultaneously using multiple code channels for each user

ITU

International Telecommunication Union mm

Key

A small piece of data used in conjunction with an algorithm to encrypt or decrypt (a) messages/data of arbitrary size (see also PKI), or (b) an attribute whose value serves to identify a unique record in a database/tableqq (e.g., employee ID number may be the primary key used to locate and identify a specific employee’s personal’’data, such as name, address, telephone number, salary).

Lightweight Mobile Code System (LMCS)

LMCS handles strong mobility of mobile code and caters to various modes of mobility

Location-Based Services (LBS)

A key value-added service for telecom operators to deliver personalized location-aware content to their subscribers using its wireless infrastructure.

Location Operating Reference Model (LORE)

It is developed to capture the location operation semantics from a layered perspective, where richer location operation semantic is modeled at a higher layer.

Media Access Control (MAC)

A layer that is responsible for the management of packet transmission.

Message Authentication Code (MAC)

A fixed-size binary code obtained by applying a shared-key cryptographic yalgorithm to an arbitrary amount of data to serve as an authenticator of the data.

Micropayment

A payment of small amounts, close to or below the minimal credit card fees (of about 20 US cents).

Page 5: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Glossary 365

Micropayment System

A system allowing merchants to charge many payments of small amounts(micropayments) from customers over open data networks such as the Internet by using one or more payment service providers (PSPs).

Mobile Switching Center (MSC)

MSC which monitors the signaling between the mobile station (MS) and the core network, and performs switching between the base transceiver station (BTS) and core network. It is also responsible for resource management for each BTS.

Multimedia Message Service (MMS)

It extends the capability of SMS to support more media f types such as images,audio clips, video clips, and more.

NetBill

A payment system where the digital check is used to sell and deliver low-priced information goods.

NetCheque System

A distributed accounting service supporting the credit–debit model of payment.––

Nonrepudiation

A proof that the consumer approved a particular action, usually a payment.

Offline Payments

Payments between the consumer and the merchant that do not requireqqcommunication with other parties such as the PSP.

Order Information (OI)

Information included in a SET transaction to describe the transaction.

Payment Approval

A process where the customer agrees to a particular payment.

Payment Authorization

A process where the PSP takes responsibility for a payment, in particular byindicating that there are funds to cover the payment.

Payment Gateway (PG)

Entity in a SET transaction that handles credit card verification and authorizationof transactions.

Payment Order (PO)

A message indicating payment to the merchant.

Page 6: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

366 Gloss a r ya y

Payment Routing Table (PRT)

A message sent by a PSP to a merchant or another PSP, indicating the terms under which the PSP sending the PRT is willing to receive payment orders issued byother PSPs.

Payment Service Provider (PSP)

An entity that maintains a long-term relationship with customers and merchants,receiving payments of aggregated (large) amounts from customers, and passing aggregated payments to the merchants.

Penalty Payment

A payment by a merchant who has had too many disputes and/or chargebacks.

Personal Identification Number (PIN)

A security method whereby a (usually) four-digit number is entered by an individual to gain access to a particular system or area.

Physical/Physiological Biometric

A biometric that is characterized by a physical characteristic rather than a behavioral trait (in contrast with behavioral biometric).

Private Key

In public-key cryptography, this key is the secret key. It is primarily used for decryption and also used for encryption with digital signatures.

Public Key

In public-key cryptography, this key is made public to all. It is primarily used for encryption but can be used for verifying signatures.

Public-Key Cryptography

Cryptography based on methods involving a public key and a private key.

Public-Key Infrastructure (PKI)

Structure used to issue, manage, and allow verification of public-key certificates.PKI is a security framework for messages and data, based on the notion of a pair of cryptographic keys (i.e., one public and one private) and used to facilitatesecurity, integrity, and privacy.

Pull Technology

It is when the handheld device initiates the communication using its gateway torequest data. The data are then pulled qq fr om the application server down to thehandheld device. The dominant paradigm of communication on the World WideWeb and in most distributed systems is this reqest–qq reply model. ––

Page 7: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Glossary 367

Push Technology

It is when the application server is in control over the handheld device. The application server makes basic content decisions and pushes data to the handheld device without waiting for the client’s re’’ uest. The push model is usually adopted qqwhen the backend applications attempt to overcome the deficiencies of pull modelby allowing the information producer to “push”““ their information to the user ”without the user initiate the request first. qq

Quality of Service (QoS)

QoS reQQ uirements are vastly different among all types of applications and should qqbe considered in the GPRS network.

Radio Frequency Identification (RFID)

The use of radio waves to facilitate wireless (contactless) communication with achip or device.

Response Time/Processing Time

The time period reuired by a biometric system to return a decision on the qqidentification or verification of a biometric sample.

Secure Electronic Commerce

A form of commerce conducted via electronic means, but designed with security in mind to enable identification, authentication, authorization, or payment processing.

Secure Electronic Transaction (SET)

A protocol for secure payment processing over the Internet in which credit card information (e.g., Visa, MasterCard) is not read or stored by a merchant. The protocol links many parties, including the customer, merchant, acquirer, and qqcertification authorities. The protocol is designed to emulate card-present transactions.

Secure Electronic Transaction (SET) Protocol

SET is a protocol produced by MasterCard and Visa. This protocol provides identity authentication, confidentiality, integration, and nonrepudiation of the transaction data.

Secure Sockets Layer (SSL)

A protocol originally introduced by Netscape to secure communication betweenWeb servers and Web clients, supported by most Web browsers and servers, and superceded by TLS.

SemiOffline Payments

Payment protocol where most transactions are offline (involving only tcommunication between the consumer and merchant, not with the PSP), but sometimes communication with the PSP is necessary.

Page 8: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

368 Gloss a r ya y

Short Message Services (SMS)

It is a non-realtime delivery system. It allows the exchange of the text messagestbetween subscribers. The text can comprise words, numbers, or alphanumericcombinations.

Simple Object Access Protocol (SOAP)

SOAP is the major approach to access regular Web services. In essence, SOAP is an XML message transmission approach over HTTP. It is assumed that HTTP is always available at the service client end and that XML messages can beprocessed there when Web services are being consumed.

Smart Card

A plastic card with an embedded chip to enable payment processing or digitalidentification. A typical smart card chip includes a microprocessor or CPU, ROM(for storing operating instructions), RAM (for storing data during processing), and ffEPROM (or EEPROM) memory for nonvolatile storage of information.

Soft Handoff

Soft handoff means a mobile station (MS) can connect to more than one base station (BS) during the handoff process, and the MS can select the link with the best connection uality. Further, soft handoff allows anqq MS to have continuousconnection with the BS so that the connection is never interrupted.

Software Agent

A computer program that acts autonomously on behalf of a person or an organization to accomplish a predefined task or a series of tasks.

Subscriber Identity Module (SIM)

SIM in the GSM comprises the subscriber’s authentication informat’’ ion, e.g., thesecret keys, and a unique identifier called internationaqq l mobile subscriber identity. The SIM always takes the form of a smart card with a limited ability of computation and storage.

Third-Generation Partnership Project (3GPP)

A set of the specific methods, services, or instructions prescribed by a computer program.

Time Division Multiple Access (TDMA)

A digital signal transmission technology, which is the foundation of the current D-AMPS and GSM. A TDMA frame lasts for 4.615 ms and is divided into eight time

slots, corresponding to a slot time of 576.9 µs. The gross data rate of a frame is271 kbps, or 33.9 kbps for a slot. This data rate is equivalent to 156.25 bit periodsqqin a time slot. There are five types of time slot burst:normal, fret: uency correction,qqsynchronization, access, and dummy slot.

Page 9: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Glossary 369

Time Stamp (TS)

he time when the object is positioned.

Transmission Control Protocol (TCP)

Internet protocol, which manages message exchanges at the transport level.

Transport-Layer Security (TLS)

An Internet engineering task force (IETF) standard protocol to securecommunication between Web servers and Web clients, supported by most Webbrowsers and servers the previous version was called SSL.;

Trusted Third Party

An organization or entity that is impartial to both the customer and the merchant (or buyer and seller), is trusted by both, and whose testimony is accepted as valid evidence in a court of law.

Universal Mobile Telecommunications System (UMTS)

The UMTS is the most widely supported third-generation mobile communications system. ITU started the process of defining the standard for third-generationsystems, referred to as International Mobile Telecommunications 2000 (IMT-2000). ETSI was responsible for UMTS standardization. In 1998 3GPP was formed to continue the technical specification work. A UMTS network consists of three interacting domains: core netw ork (CN), UMTS terrestrial radio access:network (UTRAN), and user equipment (UE).qq

Uniform Resource Locator (URL)

URL specifying the unique address of a Web document.qq

Validation

The process of demonstrating that the system under consideration meets thespecification of that system in all respects.

Wireless Application Protocol (WAP)

A specification that allows users to access information instantly via handheldwireless devices such as cellular phones, pagers, and personal digital assistants(PDAs) through wireless communication networks and the Intertt net. WAP includes rrwireless application environment (WAE), wireless session protocol (WSP),wireless transaction protocol (WTP), wireless transport layer security (WTLS),and wireless datagram protocol (WDP).

Wireless Datagram Protocol (WDP)

A datagram protocol for non-IP wireless packet data networks. WDP specifies how different existing bearer services should be used to provide a consistent service to the upper layers of the WAP architecture framework.

Page 10: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

370 Gloss a r ya y

Wireless Markup Language (WML)

An XML-based markup language for wireless handheld devices, including cellular phones, pagers, and PDAs.

Wireless Public Key Infrastructure (WPKI)

WAP Forum established the WPKI framework not as a new PKI standard but as an extension of the traditional PKI to the wireless environment. It utilizes twoapproaches to satisfy the mobile device’s req’’ uirement (1) It makes use of ellipticqqcurve cryptography, and (2) It reduces certain fields within the X.509 certificate to cut down on the total length. The specifics are illustrated more clearly in Sect.3.2.1. Aside from those differences, WPKI is also a certificate-based infrastructure.

Wireless Session Protocol (WSP)

A protocol family derived from the HTTP version 1.1 standard with extensions for wireless data applications. WSP provides WAP applications with a consistent interface for session services.

Wireless Telephony Applications (WTA)

A framework for integrating wireless data applications with voice networks. WTAaais a collection of telephony-specific extensions for call and feature controlmechanisms that make advanced mobile network services available to the mobile users.

Wireless Transaction Protocol (WTP)

A protocol operating on top of a secure or insecure datagram service. WTP is anextremely lightweight reqest–qq response––– acknowledge transaction protocol.––

Wireless Transport-Layer Security (WTLS)

A security protocol based on SSL and adapted to wireless networks and datagram transports.

Page 11: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

About the Editors

Weidong Kou is the chief architect and senior manager at IBM Software Group inGreat China Group, and adjunct professor of Xidian University. He was the direc-tor of ISN National Key Laboratory of China and dean of the School of ComputerScience and Technology at Xidian University, China.

Prof. Kou is the Laureate of 2004 Friendship Award of China, the most prestige award and the highest honor from the National Government of China.

Prof. Kou also serves as adjunct professor, honorary professor, or guest profes-sor in more than a dozen of universities, including the University of Maryland, theUniversity of Hong Kong, and Shanghai Jiao Tong University.

Prof. Kou has authored/edited seven books in the areas of e-commerce, secu-rity, and multimedia technologies, and published over 80 refereed papers. He has also authored nine issued patents from US and Canada. He has served as a guest editor of special issues on e-commerce for the International Journal on Digital

Libraries, an associate editor of International Journal on Education and Informa-tion Technologies, and a member of Editorial Review Board of Journal of Elec-

tronic Commerce in Organizations. Prof. Kou was the general chair of 2004 IEEEInternational Conference on e-Commerce Technology for Dynamic E-Business.

Prof. Kou has over 20 years of IT industrial experience, including 12 years of experience in the software development and management in North America. From 1997 to 2000, Prof. Kou was the principal investigator at the IBM Center of Ad-vanced Studies in Toronto, Canada. From 1995 to 1997, he was an architect of a major B2B e-commerce project at the IBM Canada. Before joining IBM in 1995,he was the chairman of the Imaging Committee at the AT&T Imaging SystemsDivision. Prior to joining AT&T in 1991, he was a Senior Software Engineer at Siemens in Toronto, Canada. He received various invention achievement and technical excellence awards from IBM, AT&T, and Siemens.

Prof. Kou was the associate director of the E-Business Technology Institute (ETI) at the University of Hong Kong from 2000 to 2003.

Prof. Kou served as the industrial co-leader of a major project of the CITR (Canadian Institute of Telecommunications Research, a Canadian National Centerof Excellence), Enabling Technology for Electronic Commerce, for more than three years. He served as a member of American National Standard Committees, ANSI X9B9 (Financial Image Interchange) and ANSI X3L3 (JPEG and MPEG), for more than four years.

Prof. Kou received his Ph.D. degree in Electrical Engineering in 1985 from Xidian University, and M.S. degree in applied mathematics in 1982 from BeijingUniversity of Posts and Telecommunications, respectively. He was a postdoctoral fellow at the University of Waterloo, Canada, from April 1987 to February 1989.

Prof. Kou is a Senior Member of IEEE, and a member of the Advisory Com-mittee of W3C. He was elected as a member of the New York Academy of Sciencesin 1992.

Page 12: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Yelena Yesha received the B.Sc. degree in computer science from York University, Toronto, Canada in 1984, and the M.Sc. and Ph.D degrees in computer and informa-aation science from The Ohio State University in 1986 and 1989, respectively.

Since 1989 she has been with the Department of Computer Science and Electrical Engineering at the University of Maryland Baltimore County, where she is presentlyan Exceptional Research Professor. In addition, from December, 1994 through August, 1999 Dr. Yesha served as the Director of the Center of Excellence in Space Data and Information Sciences at NASA.

Her research interests are in the areas of distributed databases, distributed sys-tems, mobile computing, digital libraries, electronic commerce, and trusted infor-mation systems.

She published over 140 refereed articles and also 13 books in these areas. Dr.Yesha has received a substantial amount of research funding as PI or Co-PI from NASA, NSF, NIST, NSA, DHMH, Aether Systems, Cisco, Fujitsu, Nokia andIBM.

She is a member of the editorial board of the Very Large Databases Journal, and the IEEE Transaction on Knowledge and Data Engineering, and is editor-in-chief of the International Journal of Digital Libraries. She served a general chair and pro-gram chair of several major international conferences, and recently served as the general chair of ACM SIGMOD 2005.

During 1994, Dr. Yesha was the Director of the Center for Applied InformationTechnology at the National Institute of Standards and Technology.

Dr. Yesha is a senior member of IEEE, Fellow of IBM CAS and a member of the ACM.

372 About the Editors

Page 13: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Contributors

Nalini Belaramani received her Master of Philosophy in computer science fromi

the University of Hong Kong in 2002. During her study, she designed the Facet programming model for the Sparkle project. She is now a Ph.D. student at theUniversity of Texas at Austin. Her current interests include distributed systemsand autonomic computing. Contact her at [email protected].

Ying Chen is a research staff member of IBM China Research Lab. His researchinterests include distributed computing, grid computing, data management, and software/services for telecom industry. Dr. Chen earned his Ph.D. in computer sci-ence from Southeast University, Nanjing, China. Dr. Chen served as the member of program committee and was invited as external reviewer for several international conferences, workshops, and journals. He has published widely in internationaljournals and conferences. Dr. Chen can be reached at [email protected].

Rada Chirkova is an assistant professor in the Computer Science Department of North Carolina State University in Raleigh. She got a B.Sc. and M.Sc. in applied mathematics from Moscow State University (Moscow, Russia), and a M.Sc. and Ph.D. in Computer Science from Stanford University. Her current research focus is on improving query-processing efficiency, by designing and materializingviews, and on evaluating queries using derived data, such as materialized viewsand indexes.

Xuefei Cao is a Ph.D. candidate in the telecommunication engineering at Xidian University. She received his B.S. and M.S. degrees in telecommunication engi-neering from the Xidian University in 2003 and 2006, respectively. Her researchinterests are in e-commerce, security, and e-payment.

Lanjun Dang is a Ph.D. candidate in the telecomg munication engineering at XidianUniversity. She received his B.S. and M.S. degrees in telecommunication engi-neering from the Xidian University in 2003 and 2006, respectively. Her researchinterests are in e-commerce, security, e-payment, and mobile communications.

Daniel Kou is a student of computer science at the University of Waterloo, Canada.tHe is interested in RFID and smart card technologies.

Francis C.M. Lau received his Ph.D. in computer science from the University of Waterloo in 1986. He is currently an associate professor and head of the Depart-ment of Computer Science at the University of t Hong Kong. His main interests are in parallel and distributed computing, Internet and the WWW, mobile computing, operating systems, and computer music. Contact him at [email protected].

Page 14: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Wei-Bin Lee received his Ph.D. degree in 1997 from National Chung Cheng Uni-versity. Since 1999, he has been with the Department of Information Engineering at Feng Chia University, where he is currently an associate professor. Presently,he is also the director of the Information and Communication Security ResearchCenter at Feng Chia University. His research interests include cryptography, in-formation security management, steganography, and network security. Dr. Lee can be reached at [email protected].

Bing Li is a Ph.D. candidate at Arizona State University, and expected to graduatei

in December, 2004. His research focuses on the areas of distributed computing, ontology oriented programming, knowledge discovery, Internet software, mobilecomputing, e-commerce/e-business, and software engineering. In the summers of 2004 and 2002, Bing Li, worked with research staffs and senior engineers at theIBM T.J. Watson Research Center. In 1998 and 1999, he worked for Bell Labsand Motorola Research Center in China. He can be reached at [email protected].

Victor O.K. Li received SB, SM, EE, and ScD degrees in electrical engineeringi

and computer science from the Massachusetts Institute of Technology in 1977, 1979, 1980, and 1981, respectively. He is the chair professor of Information Engi-neering at the University of Hong Kong, Hong Kong, and formerly the managing director of Versitech Ltd, the technology transfer and commercial arm of theUniversity. Previously, he was the Professor of Electrical Engineering at theUniversity of Southern California (USC), Los Angeles, California, USA, and direc-tor of the USC Communication Sciences Institute. His research interest is in infor-mation technologies, focusing on the Internet and wireless networks. He is a fellow of the IEEE, and a UK Royal Academy of Engineering Senior Visiting Fellow.

Dong Liu received his bachelor in radio electronics, master and Ph.D. in remotesensing from Peking University in 1990, 1993 and 1996. From 1996 to 2004, he was a research staff member, research manager, and senior research manager at IBM China Research Lab, where he led high performance web server, pervasivecomputing middleware, database and VoIP related research projects with impor-tant technical contributions to IBM DB2, WebSphere, and Lotus product lines. Hejoined Intel in 2004. His team is working on advanced system management capa-bility across Intel platforms. He has published widely in peer reviewed journals and conferences. He has over 10 patents issued or being reviewed.

Jiming Liu is professor and head of computer science department at Hong Kong Baptist University (HKBU). He directs Centre for e-Transformation Research(CTR), a government-funded centre focusing on research in Web intelligence (WI) and autonomy oriented computing (AOC). Prof. Liu holds a B.Sc. from East China Normal University, an M.A. from Concordia University, and an M.Eng. and a Ph.D. both in electrical engineering from McGill University. Prof. Liu’s present research interests include: web intelligence and the wisdom web, multi-agent sys-tems and autonomy oriented computing paradigm, social networks computing, self-organization and complex systems modeling, and distributed data-mining,

Contributors 374

Page 15: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Contributors

learning, and reasoning methodologies. Prof. Liu has published over 180 scientific articles in refereed international journals, books, and conferences. In addition, hehas published 26 books and proceedings, among which 7 are research mono-graphs. Prof. Liu is the editor-in-chief of Web intelligence and agent systems (IOS Press), annual review of intelligent informatics (World Scientific Publishing), and The IEEE intelligent informatics bulletin (IEEE Computer Society TCII). He is anassociate editor of IEEE Transactions on Data and Knowledge Engineering (IEEEComputer Society), Knowledge and Information Systems (Springer), InternationalJournal of Web Information Systems (Troubador Publishing), International Jour-nal of Web Services Research (Idea Group), and Frontiers in Artificial Intelligenceand Applications book series (IOS Press). Prof. Liu is the co-founder of Web In-telligence Consortium (WIC) and the IEEE/WIC/ACM International Conferenceon Web Intelligence (WI) and the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT) series.

Yi Liu is a Ph.D. candidate in the telecommunication engineering at Xidian Uni-versity. He received his B.S. and M.S. degrees in telecommunication engineering from the Xidian University in 2003 and 2006, respectively. His research interestsare in e-commerce, security, and e-payment.

Filip Perich is a Senior Software Engineer at Shared Spectrum Company and an Adjunct Assistant Professor at University of Maryland Baltimore County (UMBC). His primary research focus is in applications of Data Management and Artificial Intelligence to problems in distributed systems, particularly with an emphasis on wireless mobile / pervasive ad hoc networks. Currently, he is devel-oping next generation (XG) technologies enabling tactical mobile users to use available communications radio frequency spectrum with minimal interference to existing legacy radios. He received Ph.D. and M.S. degrees in Computer Science from UMBC, and A.B. degree in Mathematics from Washington College in Maryland. Perich is an author of over 25 refereed publications. He is profession-ally active in advising graduate students, serving on Ph.D. committees, and inorganizing conferences and workshops on Artificial Intelligence, Data Manage-ment, E-Commerce, Networks, and Semantic Web.

Thiruvengadam Radhakrishnan is a professor of computer science and software engineering at Concordia University in Montreal, Canada. He obtained his engineer-ing degrees from Guindy Engineering College in Madras and from IIT Kanpur. For the past 30 years he has been at this University and served in many different capaci-ties. His current research interests are in real-life applications of the agent technol-ogy, distributed information processing, and human–computer interfaces. He has published research papers, co-authored text books, and holds patents. His emailaddress is [email protected].

Dongxu Shen received the B.S. from Harbin University of Engineering, Harbin, China, in 1995, M.S. and Ph.D. from Rensselear Polytechnic Institute, Troy, NewYork, USA, in 1999 and 2001, respectively, all in electrical engineering. From

375

Page 16: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

2001 to 2004, he is a research associate at the Department of Electrical andElectronic Engineering of the University of Hong Kong, Hong Kong. His re-search interests include smart antenna, OFDM systems, media access, schedul-ing, and cross-layer optimization.

Pauline P.L. Siu received her Master of Philosophy in computer science from theUniversity of Hong Kong in 2004. She developed the context-aware state manage-ment system (CASM) for the Sparkle project. Contact her at [email protected]

Song Song is a senior manager at IBM China Research Lab, where he led perva-sive computing and wireless application research projects. Mr. Song received a master degree in biomedical engineering from Tsinghua University in 1988. Beforehe joined IBM in 1995, Mr. Song had been doing researches in medical informaticsand imaging systems in Chinese Academy of Medical Sciences as a professor for many years. Mr. Song can be reached at [email protected].

Yu Song is a software developer at MathWorkg s, developing software tools for analysis, design, and simulation of communication systems. He earned his Ph.D. in Signal Processing from Tsinghua University, Beijing, China, and conducted postdoctoral research at University of Texas, San Antonio, Texas. He can befreached at [email protected].

Cho-Li Wang received his B.S. degree in computer science and information engi-g

neering from National Taiwan University in 1985. He obtained his M.S. and Ph.D.degrees in computer engineering from University of Southern California in 1990and 1995, respectively. He is currently an associate professor of the Department of Computer Science at the University of Hong Kong. His areas of research includeparallel architecture, cluster and grid computing, and mobile and ubiquitous sys-tems. Contact him at [email protected].

Rong Yan is a staff research member of IBM China Research Laboratory. She earned her Ph.D. in electronic engineering from Beijing Institute of Technology,China, in 2002. Her research interests are in the areas of video coding, error resil-ience technology, and DRM. Dr. Yan can be reached at [email protected].

Tao Yan is a Ph.D. candidate in the telecommunication engineering at Xidian University. He received his B.S. and M.S. degrees in telecommunication engineer-ing from the Xidian University in 2003 and 2006, respectively. His research inter-ests are in smart card, RFID, and e-commerce.

Bo Yang is an associate professor of computg er science department at Jilin Univer-sity. Now he is doing postdoctoral research at Computer Science Department of Hong Kong Baptist University. He received his B.Sc. degree (June 1997), M.S.degree (June 2000) and Ph.D. degree (June 2003) from Computer Science Department of Jilin University. His present research interests include: autonomy oriented comput-ing, social networks computing, mobile agent systems and multi-agent systems.

Contributors376

Page 17: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Yudong Yang is an Advisory Research Member at IBM Research China. He got g

his Ph.D. in Computer Science from Tsinghua University, China, in 1997. He was awith Microsoft Research China before join IBM. He began his academic career inareas including virtual reality and computer vision and later moved to Internet content analysis and delivery. His current focuses are embedded system and mediaaccelerator architecture. Dr. Yang can be reached at [email protected].

Chow Yuk received his Master of Philosophy in computer science from the Uni-versity of Hong Kong in 2002. He developed the lightweight mobile code system(LMCS) for the Sparkle project. Contact him at [email protected]

Liang-Jie Zhang is a research staff member and the founding chair of the Services g

Computing Professional Interest Community (PIC) at IBM T.J. Watson Research Center. Dr. Zhang is a member of Business Informatics with a focus on service-oriented architecture and Web services for industry solutions and services. He has filed more than 30 patent applications in the areas of e-business, Web services, rich media, data management, and information appliances, and has published morethan 80 technical papers in journals, book chapters, and conference proceedings. Dr. Zhang chairs IEEE Computer Society Technical Committee on Services Com-puting and serves as editor-in-chief of the International Journal of Web ServicesResearch (JWSR). He was the general co-chair of the 2005 IEEE InternationalConference on Web Services (ICWS 2005) and the 2005 IEEE International Con-ference on Services Computing (SCC 2005). He can be reached at [email protected].

Xiaolei Zhang is a Ph.D. candidate in the computer science at the University of g

Hong Kong. She received her B.S. and M.S. degrees in computer science from theNanjing University in 1996 and 2000, respectively. Her research interests are in mobile and pervasive computing. Contact her at [email protected].

Kewen Zhao is a MS student in the telecommunication engineering at Xidian University. He received his B.S. degree in telecommunication engineering from the Xidian University in 2003. His research interests are in e-commerce, security, and e-payment.

Contributors 377

Page 18: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

16QAM 33-34 3G 34, 45, 69, 71, 250, 256 8PSK 33-34

A3 12-13 A5 14-15, 22

A5/1 15 A5/2 14

Access grant channel (AGCH) 19 ACID 154, 166 Adaptive multi-rate (AMR) 35 Ad-hoc On-Demand Distance Vector

Routing Algorithm (AODV) 137 Advanced forward link triangulation

(AFLT) 33 Advanced forward link trilateration

321 AGD 113-114 Agent communication language

(ACL) 201, 226 Agent coordination in multi-agent

system 204 Direct coordination model 204 Indirect coordination model 204

A-GPS 33, 35 Angle of arrival (AOA) 321 Anonymity key (AK) 39 AP 66-68, 320 Application Customized Description

(ACD) Application Originated (AO) 269 Application Terminated (AT) 269 Approaches to develop web/mobile

serviceDeduction 306 Induction 306

ARM wideband (ARM-WB) 273 Assisted GPS (AGPS) 322 AUTH_DATA 30 Authentication 44, 64, 66-69, 71, 83,

191-192

Authentication and Key Agreement (AKA) 39

Authentication center (AC) 247 Authentication center (AuC) 10 Authentication vector (AV) 39 Auto-correlation 23 Automate electronic transactions 236

Barcodes 91-92, 106 Base station controller (BSC) 10 Base station subsystem (BSS) 10, 257 Base transceiver station (BTS) 9 BDI model 159 Bluetooth 63-65, 133, 134, 136,

138-141, 144, 155, 156, 167, 168, 234, 236, 302, 320

Bluetooth authentication 63-65 Bleutooth vulnerabilities 63-64

CALAIS 331 CAM 121, 122, 126, 127 Cambridge Positioning Systems

(CPS) 332 Cascade pixel domain transcoder

(CPDT) 282, 283 Cdma 2000 23, 32, 35, 38, 41

Cdma 2000 1x 32-34 Cdma 2000 1xEV-DO 33-34 Cdma 2000 1xEV-DV 32

CDMA ONE 27 Cell of origin (COO) 320, 321 Cell sectorization 26 Cellular authentication voice privacy

encryption (CAVE) 30 Cellular message encryption

algorithm (CMEA) 30 Certificate revocation list (CRL) 50 Certification authority (CA) 48 Channelization codes 24 Chinese National Standards

Management Committee

Index

Page 19: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Cipher key (CK) 13, 40 Cipher-block-chaining (CBC) 41 Cisco LEAP 67-68 Client-proxy-server model 132-134 Code division multiple access

(CDMA) 22 Cdma2000 23, 32, 35, 38, 41 IS-95 23, 27-32, 41 UMTS 23, 34-41, 69, 71, 246-248

Common Adapter Framework (CAF) 313, 317, 318

Complex spreading 24 Component-based software

infrastructure 115 Composite Capability/Preference

Profiles (CC/PP) 291 Compressed domain transcoder

(CDT) 282 Confidentiality 45, 71 Context-aware mobile computing

109-112, 115, 116, 128, 129 New features 109, 111

Context-awareness 112, 129 Dynamism 110, 111, 115 Environmental heterogeneity 110 Support for mobile people 110

New requirements 111, 112, 119, 121

Infrastructure 111, 112, 114, 115 Representative projects 112

AURA at CMU 112 GAIA at UIUC 113 One world 114, 115

Context-aware state management system (CASM) 119

Continuous, Active Monitor Engine Location-based Services (CAMEL)

Convolutional code 27 Core network (CN) 10, 35 Cross-correlation 23 CS 1 18 CS 2 18 CS 3 18 CS 4 18

DARPA Agent Markup Language (DAML) 139, 140

Data Access Agent (DAA) 150 Data management 132, 133, 135, 142,

143-145, 154, 156-159, 163, 169-171

Data Server (DS) 322 DBMS 147, 150, 151 Dedicated control channel (DCCH)

32Denial-of-Service (DoS) 68 Destination Sequential Distance

Vector Routing Algorithm (DSDV) 137

Differential GPS (DGPS) 320 Direct sequence spread spectrum

(DSSS) 246 Discrete cosine transform (DCT) 281 Document type definition (DTD) 79 DOMINO 330 DReggie 139, 140 DRM Content Format (DCF) 274 Dynamic Source Routing Algorithm

(DSR) 137

EAP-Transport Layer Security (EAP-TLS) 67

ECC 51, 59, 60, 62, 72 ECMAScript 79, 80 E-commerce 199, 200, 204, 213, 217,

342 Electronic cash 244, 248 Electronic check 249 Electronic Product Code (EPC) 104 Electronic serial number (ESN) 30 Elliptic Curve Cryptography 51

Elliptic curves over Fp addition 53 Elliptic curves over Zp 51

Elliptic Curve Diffie-Hellman Key Exchange (ECDKE) 58, 59

Elliptic Curve Discrete Logarithm Problem (ECDLP) 56

Encryption 45-47, 49, 57, 64, 67, 71 asymmetric cryptosystem 48 symmetric cryptosystem 48

380 Index

Page 20: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Enhanced data rates for GSM evolution (EDGE) 18

Enhanced messaging (EMS) 234 Enhanced observed time difference

(E-OTD) 320-321 Enhanced Service Discovery Protocol

(ESDP) 140 E-payment

Credit card based e-payment Digital cash 362 Digital check 362 Micropayment 248, 249 Smart cards 104

Equipment identity register (EIR) 10 European Telecommunication

Standards Institute (ETSI) 7, 291 Examples of agent coordination in

e-commerce 204 Advertised sales/purchases 206 Dynamic public auction 204 Shopping in multiple markets 205

Extending web service to mobile services

Context sensitivity 300 Mobility 300 Multi-modality Peer-to-peer 302, 304 Resource limitations 302 Security 300

Extensible Authentication communication protocol (EAP) 67

eXtensible Markup Language (XML) 78, 139, 299

External Functionality Interface (EFI) 274

Facet 116-124 Code segment 116

Container 117, 119 Shadow 116

Facet dependencies 117 Facet execution tree 118 Facet specifications 117, 118 FIPA 201, 204, 208, 216 Forrester Research 234

Forward error correction (FEC) 27 Forward packet data channel (F-PDCH)

34Frequency division duplexing (FDD)

7, 38 Fundamental channel (FCH) 32

Gateway GPRS support node (GGSN) 16

GGSN-D 17 GGSN-S 17

Gateway mobile switching center (GMSC) 10

Gateway MSC for SMS (SMS-GMSC) 257

Gaussian minimum shift keying (GMSK) 7

General architecture of mobile service 303, 304

Mobile client 303, 305 Context information 301-303,

305-307 Device profile 305 Integration manager 303, 305

Mobile service server 303 Context adaptor 303-308 Context information collector

303, 308 Device moderator 304, 308 Multi-modal adaptor 303, 308 Resource manager 304, 307, 308

General Packet Radio Service (GPRS) 15

Air interface 8, 12-15, 18, 21, 22, 32, 34, 36, 38

Circuit switching 15, 35 Network architecture 10, 11, 16, 27 Packet switching 15, 16, 19 Quality of service 19, 20 Resource management 10, 19, 34 Security features 15, 22, 39

Generic Authentication Architecture (GAA) 248

GIF 276, 277 Global positioning system (GPS) 27,

320, 322

381Index

Page 21: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Global system for mobile communication (GSM) 1, 7

Hard handoff 25, 26 High speed circuit switched data

(HSCSD) 18 Home environment (HE) 39 Home location register (HLR) 10,

247, 257 Home Location

Register/Authentication Center (CHLR/AuC) 69

Hybrid automatic repeat request (H-ARQ) 34

Hypertext Transfer Protocol (HTTP) 299

IBM WCS m-commerce solution 354

Integrity 39-41, 44, 45, 67, 71-72 Integrity key (IK) 40 Interactive MMS (iMMS) 357 Interface agent (IA) 240 International mobile station

equipment identity (IMEI) 12 International mobile subscriber

identity (IMSI) 12, 247 International mobile

telecommunications 2000 (IMT-2000) 34

International telecommunication union (ITU) 34

Internet contents provider (ICP) 288 Internet payment protocol (iKP) Interworking MSC for SMS

(SMS-IWMSC) 257 IPSec 155 IS-856 33 IS-95 23, 27-30, 32

Authentication and encryption 10, 30

Handoff 10, 24-26, 28, 29 Base station assisted handoff 29 Mobile assisted handoff 29

IS-95 A 27 IS-95 B 27

Logical channel 285 Access channel 19, 28, 29 Forward traffic channel 28 Paging channel 28 Pilot channel 28, 29 Reverse traffic channel 28 Synchronization channel 28

Power control 24, 27-29, 32, 33, 36-38 Closed loop 29, 36 Open loop 29, 37

Java Agent Development framework (JADE) 207

JavaScript 79, 80 Jini Lookup Service (JLS) 140 Joey Transaction (JT) 151 Joint detection (JD) 38 JPEG 274, 277, 278, 284, 291 JPEG-LS 277

Kangaroo Transaction (KT) 150 Kasami sequence 23

Lightweight Mobile Code System (LMCS) 119, 124

Linear shift feedback register (LSFR) 14 Link adaptation (LA) 18 LITESET/A++ 242, 243 Location Filter (LF) 322-324 Location Listener (LL) 322-324 Location measurement units (LMUs)

321 Location operation reference model

(LORE) 312 Agent domain 316, 317 Infrastructure supporting LORE 316

Location server 313, 316-320, 326, 330, 332

Moving object database 313, 314, 323

Spatial pub/sub engine 316, 325, 326, 332

Management domain 315, 317, 318 Operation semantics domain 313,

315, 316 Privacy and security domain 315, 317

382 Index

Page 22: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Location provider identifier (LPID) 327

Location server 313, 314, 316-320, 326, 330, 332

Common adapter framework 313, 317, 318

Location APIs 317, 320 Positioning technology 320, 330 Service management framework

317, 318 Location-aware services providers

(LASPs) 312 Location-based services (LBS) 312

Macroblocks (MB) 281 Maximal length sequence

(m-sequence) 23 Media access control (MAC) 19 Minimum Bounding Rectangle

(MBR) 328 MM1 262, 266, 271 MM2 266, 267 MM3 266-268 MM4 264, 266-268 MM5 266, 267 MM6 266, 268 MM7 264, 266, 268, 274 MM8 266, 268 MM9 266, 268 MMDC and Multimedia Expert

Group (MMEG) 264 MMS Center (MMSC) 266, 258 MMS Environment (MMSE) 266 MMS PDU 270-272 Mobile ad-hoc networks 175

Data management challenges 145, 156, 158

Data management framework 135 Communications layers 136, 141,

160, 167 Data management layer 135, 142,

154, 163 Discovery layer 138, 141, 156 Location management layer 141 Security and privacy plane 155 System management plane 156

Transaction management layer 154, 160

Routing 133, 135-137, 155-158, 168

Mobile application part (MAP) 39 Mobile certificate 46

Certificate formats 49, 50 Certificate revocation 50 Certificate URLs 50

Mobile commerce (m-commerce) 335, 336, 341

Architecture 317, 322, 323, 325, 326, 330, 331, 339-341, 343

Asynchronous mode 342-344 Notification mode 342, 343 Online web mode 341, 342 Voice mode 343, 344, 345

Benefits 337, 349, 351, 354 Characteristics 336, 341, 351 Requirements and key issues 337

Mobile devices 335-337, 339, 341, 344, 346-349, 351, 354, 359

Mobile payment 339, 359 Privacy 312, 319, 326, 328, 330,

332 Security 313-318 Wireless network 318, 331

Mobile computing applications 133 Client-proxy-server model 132,

134 Client-server model 133, 145, 148 Peer-to-peer 133, 134, 138, 149,

152, 155, 156, 167 Mobile content delivery technologies

253, 292, 300 Mobile equipment (ME) 37 Mobile host (MH) 145 Mobile Multimedia Drafting

Committee (MMDC) 264 Mobile Originated (MO) 257, 269 Mobile payment 233-236, 242,

244-246, 248-252, 339, 359 Characteristics 233, 288

Payment methods 244 Payment standardization 239

383Index

Page 23: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Mobile payment agents 233, 252 Security for mobile payment 233,

244 Basic secure requirement 244, 245 Secure infrastructure 246 Mobile payment protocols 245, 248

Mobile payment lifecycle 236 Mobile service computing 299 Mobile Station Identifier (MSID)

318 Mobile stations (MS) 7, 12 Mobile Terminated (MT) 257, 269 Mobile Transaction Manager (MTM)

150 Mobility location client (MLC) 314,

317 MOD 313, 314, 316, 322, 325, 326,

330 MoGATU model 133, 156, 158, 160,

161, 171 Data representation model 159 Device abstraction 157 MoGATU architecture model 161

Application layer 155, 160 Communications layer 167 Data management layer 135, 142,

154, 163 MOST model 330 Motion estimation (ME) 281, 285 Motion vector (MV) 281, 284 Moving object database (MOD) 313,

314, 323 MPEG 281 MPF 236, 244 Multimedia Broadcast/Multicast

Service (MBMS) 248 Multimedia messaging (MMS) 234,

262, 346 Applications 263 Architecture 266 MMS client-side structure 274 Specifications 264 Structure of MMS message 266

Supported media and file formats 272 Transactions 269 WAP implementation of MM1 269

Near-far effect 24 Neighborhood-Consistent Transaction

(NC-Transaction) 166 Network and switching subsystem

(NSS) 10, 11 Non-repudiation 45, 47, 48

Object checkpoint table (OCT) 323 Object identifier (OID) 327 Observed time difference of arrival

(OTDOA) 264 Open Mobile Alliance (OMA) 264 Open Standards Interconnection

(OSI) 136 Operation and maintenance center

(OMC) 10 Operation subsystem (OSS) 10, 11 O-QPSK 28 Order information (OI) 240, 241 ORYX 30

Packet control unit (PCU) 18 Packet temporary mobile subscriber

identity (P-TMSI) 22 Packetized DRM Content Format

(PDCF) 274 Payment gateway (PG) 242, 250 Payment information (PI) 236, 241 Peer-to-peer computing model 133 Personal digital assistant (PDA) 233,

260, 300 PNG 274, 277, 278 Point-to-Point Protocol (PPP) 67 Point-to-multipoint (PMP) 16 Point-to-point (PTP) 16 Protected EAP (PEAP) 67 Public key infrastructure (PKI) 48,

248, 338 Public limited mobile network

(PLMN) 10 Public Wireless LAN (PWLAN)

251

QPSK 27, 28, 33, 34, 38 Quality of service (QoS) 20 Query Engine (QE) 322-324

384 Index

Page 24: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

RADAR 141 Radio access network (RAN) 247 Radio Frequency Identification

(RFID) 89, 103 Automatic identification 104 Operating frequency 97 Power supply 95

Active 93 Passive 93

Representative models Radio network controller (RNC) 36 RAKE receiver 26 Random access channel (RACH) 19 Random number (RAND) 12, 30, 39 Reactive tuple space 206-208, 212 Region of interest (ROI) 278, 291 Request-To-Send and Clear-To-Send

(RTS-CTS) 136 Resource usage vector (RUV) 118 Response (RES) 40 RFID application 97, 107 RFID middleware 99, 100 RFID protocol 94 RFID standards 103 RFID standards systematic structure

103 RFID systems 90, 92, 97

Anticollision 97 Back-end database 101, 105 Data coding 260 Modulation 338 Reader anti-collision 97 RFID reader 91, 96 RFID tag 91 Security and privacy plane 155 Risks 249

Tag anti-collision 97 Transceiver-transponder coupling and communication 93

RFID tags(smart label) 91 Active 93, 94, 96 Microchip 90, 94 Passive 93-96 Semi-passive 93 Transceiver 9, 257

RGB 278

Role-based Access Control (RBAC) 319

RSA 45

Scalable Vector Graphics (SVG) 274 Scrambling codes 24 Secure electronic transaction (SET)

242, 367 Secure sockets layer (SSL) 83 Semantic Service Discovery Protocol

(SeSDP) 139 Challenges 145

Sequence number (SQN) 39 Service data unit (SDU) 21

Duplicated SDU 21 SDU corrupt 21 SDU lost 21 SDU out-of-sequence 21

Service Discovery Protocol (SDP) 138-140

Service Discovery System (SDS) 139 Service Location Protocols (SLP) 138 Serving GPRS support node (SGSN)

16SGSN-D 17 SGSN-S 17 Serving network (SN) 39 Session initiation protocol (SIP) 35 SET/A 242, 243 SET/A+ 242, 243 Shared security data (SSD) 30

SSD_A 30 SSD_B 30

Short Message Entity (SME) 256 Short message service (SMS) 5, 30,

84, 253, 261, 292 Architecture and basic services 256 Business model and applications

253, 254 Deployment of MS 254, 260 Enhanced messaging service 262 MO SMS 249 MT SMS 249 Protocols and message structure

258 SMS submission protocols 260

385Index

Page 25: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Short-range ad-hoc networking technologies 132, 134, 156

Signal-to-interference plus noise ratios (SINR) 24

SIM Toolkit (STK) 260 Simple Object Access Protocol

(SOAP) 293, 299 Simple Service Discovery Protocols

(SSDP) 139 SMS Cell Broadcast service

(SMSCB) 256 SMS Center (SMSC) 250, 256 SMS Point to Point service (SMSPP)

256 Soft handoff 24-26, 29 Software Development Kit (SDK)

357 Spatial Temporal R-tree (STR-tree)

331 Spread spectrum (SS) 23 Spreading codes 23, 24, 26

Orthogonal code 23, 24 PN code 23, 27

State-on-demand (SOD) 119, 130 Subscriber identity module (SIM) 12,

37, 247 Supplemental channel (SCH) 32 SVG 274, 277 Synchronized Multimedia Integration

Language (SMIL) 272

Task agent (TA) 223, 240, 241 Temporary mobile subscriber identity

(TMSI) 12, 22 Terminal Equipment (TE) 257,

260-261 Text-to-speech synthesis (TTS) 344 The Sparkle Project 115, 116

Architecture 115, 117, 129 Experiments and evaluations 122 Facet-based application model

116Third generation partnership project

(3GPP) 7, 32, 256, 264 Third generation partnership project 2

(3GPP2) 32, 264

Time division duplexing (TDD) 38 Time division multiple access

(TDMA) 9 Time of arrival (TAA) 258, 320,

321Time-parameterized R-tree

(TPR-tree) 330 Timestamp (TS) 146, 320, 327 ToS 327, 328 Trajectory-Bundle tree (TB-tree)

331Transcoding 134, 253, 275, 276, 278,

280, 282 Audio 253, 273, 274, 276, 285,

286 Image 253, 272, 274, 276, 279 Video 253, 263, 274, 280 Webpage 287

Transport layer security (TLS) 77, 78, 83, 85, 86

TLS handshake protocol 87 TLS record protocol 87

Transport Protocol Data Unit (TPDU) 259

Trigger Handler (TH) 322, 323, 325, 326

Trusted third party (TTP) 48, 243, 339

Tuple space 199, 212, 217, 220-222, 224-229

Tuple space based agent interaction primitives 208 A case study in e-commerce 200,

217 Agent architecture of TSAF 213 Agent programming with TSAF

framework 216 Benefits 200, 214, 217, 277, 281,

286, 337, 349, 351, 354 Two-phase commit protocol (2PC)

150, 154

UMTS subscriber identity module (USIM) 37

UMTS terrestrial radio access network (UTRAN) 35, 246

386 Index

Page 26: Glossary - Springer978-3-540-30637-5/1.pdf · Glossary Application ... and performs switching between the base transceiver station (BTS) ... application server makes basic content

Universal Browser (UB) 125 Universal Description, Discovery and

Integration (UDDI) 3, 299 Universal mobile telecommunications

system (UMTS) 34, 291 Universal Plug and Play (UnPP) 138 Universal Resource Locator (URL)

300 Unstructured Supplementary Service

Data (USSD) 236 User datagram protocol (UDP) 84 User equipment (UE) 35, 267 User/Device (UD) 289, 318

Value added services (VAS) 253, 260 Structure of TSAF 212

Variable length entropy coding (VLC) 281

Variable spreading factor (VSF) 23 Vector quantization (VQ) 281 Virtual private network (VPN) 34 Visited Location Registers (VLRs) 69 Voice activity detector (VAD) 35 Voice over IP (VoIP) 33 Voice privacy mask (VPM) 30 VoiceXML 344, 347

Walsh code 23-25, 27, 28, 32 WAP architecture 76, 77, 82, 84 WAP binary XML content format

(WBXML) 78, 81 WAP Forum 76, 264, 269 WAP gateway 79-82, 84-86 WAP model 84 WAP protocol stack 79

Application layer 77, 79, 82 Security layer 77 Session layer 77 Transaction layer 77 Transport layer 77, 78, 83-86 Wireless application environment (WAE) 77, 78 Wireless datagram protocol (WDP) 78, 84 Wireless session protocol (WSP)

77, 78, 82

Wireless transaction protocol (WTP) 77, 78, 83 Wireless transport layer security (WTLS) 78, 83, 85 Web Ontology Language (OWL)

159 Web service 299-302, 309 Web Services Description Language

(WSDL) 299 WebSphere Commerce Suite (WCS)

354 WAP Identity Module (WIM) 274 Wired Equivalent Privacy (WEP) 155 Wireless Alarm System (WAS) 306,

307 Wireless application protocol (WAP)

76, 86, 264 Wireless application security 85 Wireless e-commerce business

application 335, 344 Architecture 322 Horizontal applications 345 Vertical applications 345

Wireless markup language (WML) 78

Wireless PKI (WPKI) 248 Wireless security 51 Wireless Telephony application

(WTA) 78, 81 Wireless Technology Telephony

Interface (WTAI) 81 Wireless Transport Layer Security

(WTLS) 155 Wideband CDMA (WCDMA) 38,

246 World Wide Web Consortium (W3C)

299 WPAN 62-64 WWAN 62, 69, 72 WMLScript 78-81

X.509 48-51

Zone definition engine (ZDE) 326, 329

Zone Of Interest (ZOI) 329

387Index