Abstract
The goal of this research is to provide an advanced programming environment for ubiquitous computing, which facilitates the development of secure and reliable ubiquitous software. A discussion follows on the design and implementation of a ubiquitous programming framework, which is based on high-level policy description language. A context-based access control manager(CACM) was implemented for context-aware access control, while an adaptation engine was integrated for context adaptation in dynamically changing environments. A simulator was also implemented for conducting experiments with this framework for ubiquitous applications.
- Joonseon Ahn, Byeong-Mo Chang, and Kyung-Goo Doh, A Policy Description Language for Context-based Access Control and Adaptation in Ubiquitous Environment, TRUST06, August, 2006Google Scholar
- J. E. Bardram, The Java Context Awareness Framework-A Service Infrastructure and Programming Framework for Context-Aware Applications, Third International Conference, Pervasive2005, Munich, Germany, May, 2005.Google Scholar
- E. Cho and K. Lee, Security Checks in Programming Languages for Ubiquitous Environments, Proceedings of 2004 Workshop on Pervasive, Security, Privacy and Trust, Aug. 2004.Google Scholar
- P. Bellavista, A. Corradi, R. Montanari, Context-Aware Middleware for Resource Management in the Wireless Internet, IEEE Transactions on Software Engineering, Vol. 29, No. 12, December 2003. Google Scholar
Digital Library
- Antonio Corradi, Rebecca Montanari, Daniela Tibaldi, Context-based Access Control for Ubiquitous Service Provisioning, Proceedings of the 28th International Computer Software and Applications Conference(COMPSAC'04), 2004. Google Scholar
Digital Library
- A. Ranganathan, Roy H. Campbell, An infrastructure for context-awareness based on first order logic, Springer-Verlag London Limited 2003, November 2003Google Scholar
- M. Roman, C. K. Hess, R. Cerqueira, A. Ranganat, R. H. Campbell, K. Nahrstedt, Gaia: A Middleware Infrastructure to Enable Active Spaces. IEEE Pervasive Computing, pp. 74--83, 2002 Google Scholar
Digital Library
- D. J. Scott, Abstracting application-level security policy for ubiquitous computing, University of Cambridge, Computer Laboratory, Technical Report UCAM-CL-TR-613, January 2005.Google Scholar
- D. Wichadakul, X. Gu and K. Nahrstedt, A Programming Framework for Quality-Aware Ubiquitous Multimedia Applications, Proceedings of Multimedia'02, December, 2002, Juan-les-Pins, France. Google Scholar
Digital Library
Index Terms
A programming environment for ubiquitous computing environment
Recommendations
A Flexible, Autonomous and Non-redundancy Access Control for Ubiquitous Computing Environment
ISISE '08: Proceedings of the 2008 International Symposium on Information Science and Engieering - Volume 01Ubiquitous computing environment comprises mobile users, system services, system resource, and sensors embedded into physical environment. The ubiquitous, dynamic, invisible, and open nature of these environments introduces challenging security issues ...
Cyber Security Concerns for Ubiquitous/Pervasive Computing Environments
CYBERC '11: Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge DiscoveryThe computing paradigm of ubiquitous/pervasive computing has changed the way in which nomadic computer users interact with computer devices and network systems. Modern ubiquitous computing devices have enabled nomadic computer users to interact with ...
Context RBAC/MAC access control for ubiquitous environment
DASFAA'07: Proceedings of the 12th international conference on Database systems for advanced applicationsUbiquitous environment that is omnipresent is existent everywhere or seems to be always present. Such an environment is a next generation paradigm in which many invisible computers are integrated into background of our lives. However, it requires more ...






Comments