The Journal of Information Science and Technology Association
(Johono Kagaku to Gijutsu)
Vol. 54 (2004) , No.1
Special feature : Mobile


Information services through mobile communication to various remote access in the ubiquitous network society
Eiichi KURAHASHI
(Faculty of Letters, Kansai University (3-3-35, Yamate-cho, Suita-shi, Osaka 564-8680))

 Abstract : Mobile communication will be increasingly important in the ubiquitous network society. Mobile phones were originally used only as aural communication tools. But they have been used also as information communication tools to access Internet and the increase of Internet access by mobile phones has been promoting m-commerce. Mobile communication technologies are mobile telecommunication with mobile phones and wireless LAN with laptop computers. Information service agencies such as libraries have been corresponding to those needs for people to access Internet with many kinds of portable mobile communication devices.

 Keywords : wireless communication / mobile communication / mobile phone / i-mode / wireless LAN / hotspot / m-commerce / ubiquitous network society

Table of Contents


Reliable P2P type communication model
Motomitsu ADACHI
(Fujitsu Laboratories LTD. Information Technology Core Labs. (4-1-1, Kamikodanaka, Nakahara-ku, Kawasaki-shi, Kanagawa 211-8588))

 Abstract : A P2P type system is an information system which all terminals (Peer) are equipped with the capability of both a server and a client. As what realizes information exchange and circulation without central management server, this system has given big impact to distribution and circulation of the contents of music or an image. On the other hand, the technology for making a P2P type system into the reliable system is needed. In this paper, the creative method of a reliability domain using P2P type agent platform is described.

 Keywords : Communication by P2P / Agents / protect copyrights / community / security

Table of Contents


Recent Technologies and Management of Secure Remote Access
Koichi HATOGAI
(Education and Research Center for Information Science, Konan University (8-9-1 Okamoto, Higashinada-ku, Kobe-shi, Hyogo 658-8501))

 Abstract : A communication infrastructure such as the internet is utilized by many people in their life, where sending data may be monitored or altered anywhere inside. Information service providers need to provide mechanisms which can send or receive valuable information only to or from the users who have the access rights. Furthermore, clear security policy for protection of the information resources needs to be provided and managed. In this document, recent technologies for realizing secure remote access which are needed when constructing secure information services and management of the secure remote access are summarized.

 Keywords : remote access / security policy / information service / VPN / IPsec / SSL / wireless LAN

Table of Contents


Limitations of Mobile and Issues
Masahiro KURODA
(Wirelss Applications Group. Yokosuka Radio Communications Research Center Communications Research Laboratory Incorporated Administrative Agency
(3-4, Hikarino-oka, Yokosuka-shi, Kanagawa 239-0847))

 Abstract : Technologies for mobile environments is developing remarkably these days. The annual shipment of the cellular phone in Japan is over 40 million sets. The cellular phone for the 3rd generation cellular system has deployed and sending video data instantly from it is possible. On other hand, the annual shipment of notebook PC is about 1 million sets. For mobile and PC environments, wireless LAN has spread repidly, and people can access web and mail outside. For this situation, we focus on limitations and issues of mobile security from a view point of users. We also give an overview of security issues on the next generation mobile network.

 Keywords : Mobile / Security / Wireless LAN / VPN / PKI

Table of Contents


Database contract and remote access requirement
Ikuo KAN
(Meijigakuin University library (1-2-37, Shirokanedai, Minato-ku, Tokyo 108-8636))

 Abstract : It introduced situation of the database contract and remote access as a means of the database utilization promotion in the university library. And, it introduced the various problems which staffs faced with the database contract in respect of the situation of the Meijigakuin Univ. library, while it interwove the situation of “the Yamate consortium" affiliation libraries.

 Keywords : database / remote access / network / consortium contract

Table of Contents


Operation and trends of digital contents to remote access
Norihiko OMIYA, Chiyoshi ISHII
(Nanzan University (18, Yamazato-cho, Showa-ku, Nagoya City, Aichi 466-8673))

 Abstract : Various kinds of digital contents services can be offered only after being able to realize construction and operation of stable and safe remote access use environment. In other words, strategic service cannot be offered if an information security is not secured. A model in case an organization is going to amount an information security in processes of duties is introduced. Concrete information security technology is not mentioned here but the management technique for clearing the information security level which an organization aims at is explained.

 Keywords : ubiquitous / remote access / information security / information security management systems / policy for information security / risk management / digital contents

Table of Contents


The measure for ubiquitous in a library <wireless LAN and an application share server>
Hitoshi NISHIMUKAI
(Health Sciences University of Hokkaido (1757 Kanazawa, Ishikari-Tobetsu, Hokkaido 061-0293))

 Abstract : The ubiquitous is the environment where somewhere or anyone can access information networks, such as the Internet, at any time. The origin of a word of ubiquitous is Latin, and means that it exists everywhere. In the text, the model of ubiquitous in a library is written from the side of hardware, and the side of software. On the side of hardware, the example which built the ubiquitous network in a library by wireless LAN is introduced. On the side of software, the example which enabled use of digital contents by ubiquitous is introduced.

 Keywords : ubiquitous / wireless LAN / digital contents / dependent on OS / IEEE802.11 / MetaFrame

Table of Contents


Chinese Patents Search
Yukie AKAKABE
(SHOWA DENKO K.K. Intellectual Property Department (13-9, Shibadaimon 1-chome, Minato-ku, Tokyo 105-8518))

 Abstract : When it comes to searching for Chinese patents, commercial English-language databases used to be the only choice for non-Chinese language searchers despite the timelag and the lack of some data. On the other hand, the database provided by the Chinese Intellectual Property Office (SIPO-DB) is the most reliable data source in terms of timelag and comprehensiveness. It provides interfaces not only for bibliographic data searches including legal status but also for abstract searches in Chinese. In order to gain criteria for searchers with only Japanese and English language command, we studied the contents and functions of SIPO-DB and compared them with commercial databases to find the most effective and comprehensive manner to search for Chinese patents.

 Keywords : patent information / Chinese patents / Database / abstracts / legal status

Table of Contents


The new information service proposal of a public library ; An example of the Yuki city
Takashi SASANUMA
(Yuki city Board-of-education library preparation office (7467-5 Ooaza Yuki, Yuki-shi, Ibaraki 307-0001))

 Abstract : A public library does not only perform various information offers by collection of books. As various information dispatch bases, by utilizing an institution, civic information activity can be activated and it can be tied to city activation. Here, the library information service plan of Yuki city, based on such an idea and the outline of a library system are introduced.

 Keywords : public library / compound institution / network construction / information service / IC tag / automatic return equipment

Table of Contents