Working in a ubiquitous computing environment Challenges for an application software manufacturer Dr. Thomas Ziegert, SAP Corporate Research
SAP Corporate Research Overview SAP Corporate Research Investigates new application domains Sources innovative technology Stimulates strategic innovation of products and solutions Currently researches in 9 global Research Programs Offers more than 6 types of Research Services Holds teams in more than 6 locations SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 2
SAP CR Worldwide Palo Alto Montreal Philadelphia Sophia Antipolis Walldorf Karlsruhe Johannesburg Brisbane SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 3
New Work Patterns Casual Mobile Work suki-ma mode M R C r r io a W d a o R Type 1: Road Warrior hired to travel, mostly mobile frequent (mission critical) use Example: sales & service staff covered Requirements specialized functionality & device offline app, specially engineered Type 2: (suki-ma mode) working in between everybody away from the office and having some spare time to work casual (emergency/convenience) access to business applications Examples: employees leave requests, time recording, workflow Requirements consistent user experience, unspecific device convenient and secure access (no violation of security policies) SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 4
What Are The Research Topics? Device independent software engineering covers the entire software lifecycle introduces device independency, context awareness and multi-modality as determining factors into software engineering aims at cost efficiency and usability Pervasive security covers security for mobile, wireless & beyond provides mechanisms for highly dynamic scenarios, like ad-hoc networks, collaborations with limited life time aims at application level security SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 5
SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 6 Device Independent Software Engineering
Device Independent Software Engineering Challenges ever growing number of end user devices diversity of device features and application domains number of (wireless) access/ad-hoc networks number of context sources... resulting in... manual adaptation to new devices is costly and cumbersome automatically generated UIs often dissatisfy people (usability!) a need for multi-modal and multi-device access to applications exists developers do not know anymore the device(s) they develop for context information can hardly be used (no standards) SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 7
Device independent software engineering Research Heading revised software lifecylce, which takes into account: device independence context awareness multi-modal and multi-device support usability engineering methods for device independence context information standards for the description and interchange methods for the use of context information This will lead to... systematic, disciplined, and quantifiable approaches for the costefficient development and evolution of high-quality, device independent, and context-aware applications for the mobile workforce. SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 8
Solution Bit: Device Independent User Interfaces An application UI must be semantically adapted for every device class Problem probably some 10+ specialized UIs required to bring an application to all device classes significantly increases effort for UI development Solution device independent UI plus meta information on UI semantics automated UI adaptation use of context information to enhance usability SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 9
SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 10 Pervasive Security
Enterprise-Security: The Model of the Past... Basic Assumption: Everything Outside is Evil... Approach to Implementing Security: 1. Security is separated from applications, 2. Security technology is deployed at the infrastructure level but mobile workers are outside the wall SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 11
Enterprise Security Strategy Security Should be Handled at the Application-level! Application Appl-oriented Sec. Application Platform (Web Server) HTTPS Platform (Web Browser) IPSEC,... Communication Communication Server Access Network WEP, GEA1/2,... Access Network Clients Move up! SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 12
Pervasive security Challenges Heterogeneity: many administrative domains, no central trust relationship Virtual Anonymity : Collaboration with previously unknown principals Complex software architectures: Portals, Exchanges, Proxies, Highly Dynamic Scenarios: ad-hoc networks, collaborations with limited life time resulting in... Classical access control does not work any more infrastructure-level security is insufficient... Research Heading Application-oriented security Trust and Identity Management Security Policy Management SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 13
Conclusion Technology-wise Mark Weisers Vision is reality now. It is now time to devise sound software engineering methods and security mechanisms to bring ubiquitous computing applications from the exceptional to the normal case. SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 14
Copyright 2003 SAP AG. All Rights Reserved No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft, WINDOWS, NT, EXCEL, Word, PowerPoint and SQL Server are registered trademarks of Microsoft Corporation. IBM, DB2, DB2 Universal Database, OS/2, Parallel Sysplex, MVS/ESA, AIX, S/390, AS/400, OS/390, OS/400, iseries, pseries, xseries, zseries, z/os, AFP, Intelligent Miner, WebSphere, Netfinity, Tivoli, Informix and Informix Dynamic ServerTM are trademarks of IBM Corporation in USA and/or other countries. ORACLE is a registered trademark of ORACLE Corporation. UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group. Citrix, the Citrix logo, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, MultiWin and other Citrix product names referenced herein are trademarks of Citrix Systems, Inc. HTML, DHTML, XML, XHTML are trademarks or registered trademarks of W3C, World Wide Web Consortium, Massachusetts Institute of Technology. JAVA is a registered trademark of Sun Microsystems, Inc. JAVASCRIPT is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape. MarketSet and Enterprise Buyer are jointly owned trademarks of SAP AG and Commerce One. SAP, SAP Logo, R/2, R/3, mysap, mysap.com and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. All other product and service names mentioned are trademarks of their respective companies. SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 15
Copyright 2003 SAP AG. Alle Rechte vorbehalten Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind, zu welchem Zweck und in welcher Form auch immer, ohne die ausdrückliche schriftliche Genehmigung durch SAP AG nicht gestattet. In dieser Publikation enthaltene Informationen können ohne vorherige Ankündigung geändert werden. Die von SAP AG oder deren Vertriebsfirmen angebotenen Softwareprodukte können Softwarekomponenten auch anderer Softwarehersteller enthalten. Microsoft, WINDOWS, NT, EXCEL, Word, PowerPoint und SQL Server sind eingetragene Marken der Microsoft Corporation. IBM, DB2, DB2 Universal Database, OS/2, Parallel Sysplex, MVS/ESA, AIX, S/390, AS/400, OS/390, OS/400, iseries, pseries, xseries, zseries, z/os, AFP, Intelligent Miner, WebSphere, Netfinity, Tivoli, Informix und Informix Dynamic ServerTM sind Marken der IBM Corporation in den USA und/oder anderen Ländern. ORACLE ist eine eingetragene Marke der ORACLE Corporation. UNIX, X/Open, OSF/1 und Motif sind eingetragene Marken der Open Group. Citrix, das Citrix-Logo, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, MultiWin und andere hier erwähnte Namen von Citrix-Produkten sind Marken von Citrix Systems, Inc. HTML, DHTML, XML, XHTML sind Marken oder eingetragene Marken des W3C, World Wide Web Consortium, Massachusetts Institute of Technology. JAVA ist eine eingetragene Marke der Sun Microsystems, Inc. JAVASCRIPT ist eine eingetragene Marke der Sun Microsystems, Inc., verwendet unter der Lizenz der von Netscape entwickelten und implementierten Technologie. MarketSet und Enterprise Buyer sind gemeinsame Marken von SAP AG und Commerce One. SAP, SAP Logo, R/2, R/3, mysap, mysap.com und weitere im Text erwähnte SAP-Produkte und -Dienstleistungen sowie die entsprechenden Logos sind Marken oder eingetragene Marken der SAP AG in Deutschland und anderen Ländern weltweit. Alle anderen Namen von Produkten und Dienstleistungen sind Marken der jeweiligen Firmen. SAP AG 2003, Working in a ubiquitous computing environment, Thomas Ziegert / 16