Mobile computing has swelled among children who readily have access to an array of mobile devices from smartphones and tablets to handheld videogames. Moreover, school-aged kids are carting mobile devices everywhere and using them to connect with friends, unknowingly revealing their location or other personal details. Yet, there are currently no Canadian privacy laws to protect kids in this environment.
Patrick Hung, PhD, Associate Professor in the Faculty of Business and Information Technology, is leading some of the world’s first research on the security and privacy of mobile toys and software. Findings of his security analysis on mobile devices and video games prompted him to explore this gap across cultural and social differences. He co-authored Mobile Services for Toy Computing, one of the first-of-its-kind books, and he is developing a novel security and privacy model to help prevent kids from revealing too much information.
Dr. Hung is a Visiting Professor in the School of Arts, Sciences and Humanities at the University of São Paulo, Brazil, and an Honorary International Chair Professor in the Department of Electronic Engineering at National Taipei University of Technology in Taiwan. Over the past decade, he has served as a visiting researcher and guest professor at universities around the world. He joined UOIT as an assistant professor in July 2004, and often travels abroad with undergraduate students providing opportunities to collaborate on world-class research through Science Without Borders and Globalink Research Internships. Previously a research scientist, Dr. Hung was recruited to UOIT from the ICT Research Centre of the Commonwealth Scientific and Industrial Research Organization (CSIRO) in Canberra, Australia.
A notable health informatics authority, Dr. Hung holds several U.S. patents for establishing a framework to improve the security of health records, and developing a model to assess the competency of healthcare students and practitioners. He earned his Bachelor of Science in Computer Science from the University of New South Wales in Sydney, Australia in 1993; and received his Master of Philosophy and his Doctor of Philosophy in Computer Science from the Hong Kong University of Science and Technology, in 1995 and 2001, respectively. To gain cross-disciplinary status, Dr. Hung completed his Master of Applied Science in Management Sciences at the University of Waterloo in 2002.
Industry Expertise (8)
Areas of Expertise (7)
Honorary International Chair Professor, Department of Electronic Engineering, National Taipei University of Technology (professional)
A proponent for creating collaborative international education, Dr. Hung was appointed to of one of Taiwan's oldest universities.
Visiting Professor, School of Arts, Sciences and Humanities, University of São Paulo, Brazil (professional)
The largest and most prestigious Brazilian university, it ranks among the world's best according to the Times Higher Education World University Rankings.
Treasurer and Executive Committee Member, IEEE Computer Society (professional)
Appointed to the society's Technical Steering Committee for Services Computing, a multi-disciplinary group tasked with advancing and coordinating work in the field of Services Computing carried out throughout the IEEE in scientific, engineering, standard, literary and educational areas.
Editorial Board Member, International Journal of Big Data Intelligence (IJBDI) (professional)
Issued quarterly by Inderscience Publishers, IJBDI provides a vehicle for disseminating the latest work in big data research, development and applications.
Executive Group Member and Coordinating Editor, Information Systems Frontiers (professional)
Published bimonthly, this journal examines new research and development at the interface of information systems and information technology; takes a multidisciplinary approach drawing from computer science, telecommunications, operations research, economics, and cognitive sciences; and serves as a common forum for frontline industrial developments as well as pioneering academic research.
Associate Editor, International Journal of Systems and Service-Oriented Engineering (IJSSOE) (professional)
Published quarterly, the IJSSOE provides a forum for researchers, academicians, and practitioners to advance the practice and understanding of contemporary theories and empirical analysis in the perspective of systems engineering in achieving service excellence under the current globalized service-oriented economy.
University of Waterloo: MASc, Management Sciences 2002
Hong Kong University of Science and Technology: PhD, Computer Science 2001
Hong Kong University of Science and Technology: MPhil, Computer Science 1995
University of New South Wales: BSc, Computer Science 1993
- Institute of Electrical and Electronics Engineers
- National Taipei University of Technology
Event Appearances (6)
An Overview of Security and Privacy Issues: Bring Your Own Device (BYOD)
Nanjing University of Finance & Economics Nanjing, China
Safety Enforcement Framework for Bring Your Own Device in Service-Oriented Architecture: Research Issues
University of Aizu Aizu, Fukushima, Japan
Soft Systems Methodology: From Services-Oriented Architecture to Big Data Analytics
Invited Speaker, Boeing Research & Development, Boeing Corporation Seattle, Washington
Software Engineering Security, and IT Job Market in North America and Hong Kong
Invited Speaker, Computer Engineering Department, Faculty of Engineering, Mahidol University Bangkok, Thailand
Services-Oriented Architecture (SOA): A Case Study in Healthcare Applications
Keynote Speaker at the 3rd Brazilian Conference on Software: Theory and Practice Natal, Brazil
Evidence-Based Technology: Case Studies and Interactions
Keynote Speaker at the Seventh IEEE International Conference on Digital Information Management University of Macau, Macau, China
Method for Competency Assessment of Healthcare Students and Practitioners
Abstract; A method to assess the competency of a healthcare practitioner, wherein the method provides a learning object repository comprising a plurality of previously created virtual objects, creates a first template and a second template by the second module, wherein the first template comprises one or more previously defined learning objectives, and wherein the second template comprises one or more previously defined competency assessments related to the one or more selected learning objectives. The method provides the first template and the second template to the learning object repository. The method displays on a visual display device a virtual clinical world comprising a plurality of virtual objects retrieved from the learning object repository. Further according to the method, a practitioner selects a virtual patient from the virtual clinical world, selects a series of interactions with the patient, and selects patient data. The method tracks the selected patient interactions, and the selected patient data.
Mobile Network Dynamic Workflow Exception Handling System
U.S. Patent No. 20070067452 A1
Also filed as U.S. Patent No. 8229785 7/24/2012 and 8392236 B2 3/5/2013. Abstract: Methods for using an exception handling system are provided for dynamically recovering from a workflow exception occurring in a healthcare mobile network communication system. An individual user can access the system through a handheld mobile device. The system has multiple workflows and at least one mission critical item. Attack tree modeling analyses are performed to identify the mission critical item. Another operation includes writing a plurality of forward recovery rules to protect the mission critical item. The recovery rules are enabled through an engine in communication with the mobile network communication system. The multiple workflows are monitored for indication of a system attack on any one of the multiple workflows. A new workflow is automatically generated upon detection of the system attack. The exception handling system is overlayed on the mobile network. Authorization is provided by the system for the individual user.
Research Grants (2)
Safety Enforcement Framework for Bring Your Own Device (BYOD) in Services-Oriented Architecture (SOA)
NSERC Discovery Grant $18000
PI. Hung, P. 4/1/2015-4/1/2016. This research aims to establish a framework to protect the online security of children (under 16 years old) using mobile services for toy computing.
Services-Oriented Architecture for Motion Sensing Services
NSERC Discovery Grant $100000
PI. Hung, P. 4/1/2010-4/1/2014. This research program has evolved with the trend in the emerging industry of services computing and motion sensing technologies. It focuses on handheld consoles with motion sensing capability in sports science, allowing the console user to interact with, and manipulate items on screen via movement and pointing through the use of motion sensing technologies.
INFR 2830U, 2nd Year, Undergraduate Course
BUSI 3501U, 3rd Year, Undergraduate Course
Web Services & E-Business Security
INFR 4660U, 4th Year, Undergraduate Course
Software Modelling Techniques and Languages for Industry Applications
CSCI 6100G, Graduate Course
Abstract: Service searching and ranking are the bases of service-oriented software development. However, the existing service searching and ranking methods are confined to the atomic services or processes encapsulated as stand-alone services. How to find and reuse arbitrary granularities of Service Process Fragment (SPF) is a challenging problem with great application value. In this paper, we propose a new mechanism to support searching and ranking on massive SPFs. In this mechanism, SPFs are organized by a tree, where both the functional and non-functional information of SPFs are encoded and stored on each tree node. Then, starting from the tree root, an integrated searching and ranking process is recursively conducted on each tree layer, excluding a great deal of irrelevant SPFs each time, until leaf nodes are reached. To verify the feasibility and effectiveness, we construct a sample dataset which contains 4 million processes and 1 billion atomic services based on the Web Service Challenge Testset Generator (CTG), and each atomic service has up to ten QoS values. The experimental results show an effective and efficient approach for SPF-Query.
Abstract: A Web service is defined as an autonomous unit of application logic that provides either some business functionality or information to other applications through an Internet connection. Web services are based on a set of extensible Markup Language XML standards such as Universal Description, Discovery and Integration UDDI, Web Services Description Language WSDL, and Simple Object Access Protocol SOAP. Nowadays Web services are becoming more and more popular for supporting different social applications, thus there are also increasing demands and discussions about Web services privacy protection in information. In general, privacy policies describe an organization's data practices on what information they collect from individuals e.g., consumers and what e.g., purposes they do with it. To enable privacy protection for Web service consumers across multiple domains and services, the World Wide Web Consortium W3C published a document called “Web Services Architecture WSA Requirements” that defines some specific privacy requirements for Web services as a future research topic. This paper presents a mathematical model to construct the privacy policies in SOAP Message Exchange Patterns MEP for social services. Further, this paper also presents the privacy policies in security tokens with SOAP messages.
Abstract: This paper presents SmartMal-a novel service-oriented behavioral malware detection framework for vehicular and mobile devices. The highlight of SmartMal is to introduce service-oriented architecture (SOA) concepts and behavior analysis into the malware detection paradigms. The proposed framework relies on client-server architecture, the client continuously extracts various features and transfers them to the server, and the server's main task is to detect anomalies using state-of-art detection algorithms. Multiple distributed servers simultaneously analyze the feature vector using various detectors and information fusion is used to concatenate the results of detectors. We also propose a cycle-based statistical approach for mobile device anomaly detection. We accomplish this by analyzing the users' regular usage patterns. Empirical results suggest that the proposed framework and novel anomaly detection algorithm are highly effective in detecting malware on android devices.
Abstract: This research introduces the concept of social distance, which is drawn from clustering methods applied to the social network user base; and incorporates distance in the estimation of trust, as well as user-generated ratings. The trust value estimated will serve as a metric for filtering and sorting content of any kind based on the trustworthiness of the creator. The results revealed that it is possible to provide an estimated measure of trust within individuals in a social network, that clustering methods were of significant help into said evaluation, and that the integration of other variables affecting the building of trust. Results also showed that higher rating scores combined with shorter social distances provide satisfactory trust values, while the opposite happened for subjects presenting lower rating scores in combination with longer distances. This study contributes to the current literature on trust estimation and social networks role in such endeavours.
Abstract: High availability of software components has long been studied. For a software system, when unavailability of a component has caused a suspension of the system, the system has to be recovered or resumed as soon as possible. To substitute an unavailable software component with a backup copy is therefore unavoidable in achieving high availability of software systems. In this paper, in comparison with using redundancies, we take an alternative approach that steps away from the physical code equivalence of the software but focuses more on the equivalence in using the function unit without concerning about the implementation itself. We investigate the problem of Web service availability in service-oriented software systems and then report a framework for Web service availability in such systems using automated and rule-based Web service substitution. The framework takes a novel approach to manage the runtime replacement of services, combining (i) an approach that classifies services using co-occurrence of terms in various tags of the service descriptions, (ii) an approach to establish the compatibility and substitution of service operation interfaces and (iii) a middleware for handling service replacements. Our approach is designed to address the problem of Web service availability from the client side and assumes that the client has no control of the Web service providers. This is a completely distributed approach in comparison with other related work and presents a valuable benefit of client orientation. As two additional distinguishing characteristics, our framework also meets the challenges of (i) semantic heterogeneity of Web services in identifying substitute service and (ii) transparency and independence in handling unavailability at the level of Web services. We show in our experiments that the service substitute identification based on the proposed framework achieves a best precision of 85 per cent. We demonstrate our implementation of the middleware for service unavailability handling in the framework. We also present experiments on service substitution within a demo business application in the presence of unavailability.
Abstract: Web services have had a tremendous impact on the Web for supporting a distributed service-based economy on a global scale. However, despite the outstanding progress, their uptake on a Web scale has been significantly less than initially anticipated. The isolation of services and the lack of social relationships among related services have been identified as reasons for the poor uptake. In this paper, we propose connecting the isolated service islands into a global social service network to enhance the services' sociability on a global scale. First, we propose linked social service-specific principles based on linked data principles for publishing services on the open Web as linked social services. Then, we suggest a new framework for constructing the global social service network following linked social service-specific principles based on complex network theories. Next, an approach is proposed to enable the exploitation of the global social service network, providing Linked Social Services as a Service. Finally, experimental results show that our approach can solve the quality of service discovery problem, improving both the service discovering time and the success rate by exploring service-to-service based on the global social service network.
Abstract: This article presents a novel collaborative service system (CSS) design methodology supporting the work of multiple participating users and collaborative services processes. The CSS application of music content creation paradigm called DesignStorming as it pertains to CSS modeling and developing. CSS is an interactive service system that can be systematic service innovation and automatic semi-automated value co-creation between service providers and customers to enhance service productivity. The objectives of this research are threefold─to propose a novel design methodology for CSS, to incorporate simple service machine (SSM) and intelligent service machine (ISM) for CSS, and to demonstrate a CSS application of music content creation. SSM is a road map that can be used to define the salient attribute elements for CSS design. According to the predefined SSM, ISM conducts modeling the cognitive process of service exchanges and service provision, their knowledge representations, and value co-production process for a computerized CSS. DesignStorming demonstrates how a CSS can be automated the interactive communications and problem-solving processes during the music content creation work. The CSS application involves the three system components: 1) Ontology Developer, 2) SFGA Partnership Matcher, and 3) Co-created Value Appraiser. In addition, a service evaluation model is described and evaluated, so that some of their important characteristics can be identified. Such a comprehensive design methodology can provide the foundation for building future more diversified and innovative collaborative service system.
Abstract: This paper addresses the issues of Base station—User Association and Resources Allocation (BUA-RA) in OFDM-TDMA based broadband wireless access (BWA) networks under passive optical networks (PON)-WiMAX integration. With the powerful coordination capability at the optical line terminal (OLT), a key technology of inter-cell cooperative transmission (CT) is incorporated in the integrated network architecture, which is called cooperative PON-WiMAX network (CPWN). To achieve an efficient integration and inter-cell cooperative transmission in the CPWNs, the BUA-RA scheme is critical to the Quality of Service (QoS) provisioning for each user. In order to minimize the network resource usage, we provide three new BUA-RA schemes which first time employ the cooperative transmission in a multi-cell BWA network. The three schemes are designed for three kinds of subscribers with different moving types, and can be adaptively applied based on the network load. Simulations are conducted to verify the proposed BUA-RA schemes by comparing with those without cooperative transmission technology. Our results demonstrate the efficiency of our proposed schemes, which are based on mathematical formulations and linearization.
Abstract: Mashup is a web technology that allows different service providers to flexibly integrate their expertise and to deliver highly customizable services to their customers. Data mashup is a special type of mashup application that aims at integrating data from multiple data providers depending on the user's request. However, integrating data from multiple sources brings about three challenges: 1) Simply joining multiple private data sets together would reveal the sensitive information to the other data providers. 2) The integrated (mashup) data could potentially sharpen the identification of individuals and, therefore, reveal their person-specific sensitive information that was not available before the mashup. 3) The mashup data from multiple sources often contain many data attributes. When enforcing a traditional privacy model, such as K-anonymity, the high-dimensional data would suffer from the problem known as the curse of high dimensionality, resulting in useless data for further data analysis. In this paper, we study and resolve a privacy problem in a real-life mashup application for the online advertising industry in social networks, and propose a service-oriented architecture along with a privacy-preserving data mashup algorithm to address the aforementioned challenges. Experiments on real-life data suggest that our proposed architecture and algorithm is effective for simultaneously preserving both privacy and information utility on the mashup data. To the best of our knowledge, this is the first work that integrates high-dimensional data for mashup service.
Abstract: This paper reports the authors' study over an open service and mashup repository, ProgrammableWeb, which groups stored services into predefined categories. Leveraging such a unique structural feature and hidden domain knowledge of the service repository, they extend the Support Vector Machine SVM-based text classification technique to enhance service-oriented categorization. An iterative approach is presented to automatically verify and adjust service categorization, which will incrementally enrich domain ontology and in turn enhance the accuracy of service categorization.