Implementation of a Scalable Context-Aware Computing System
نویسندگان
چکیده
Context-aware computing requires the automatic tailoring of information and services based on the current context of the user. The context of the user typically consists of a set of userspecific parameters including his location, the characteristics of the access device and interface, and the interests of the user, usually represented in an user profile. Rover enables services with the following characteristics: • Location-aware, in addition to the more traditional notions of time-aware, user-aware, and device-aware. • Available via a variety of wireless access technologies and devices , and allows roaming between the different wireless and device types. • Scales to a very large client population.
منابع مشابه
A semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملScalable and adaptive context delivery mechanism for context-aware computing
Presence of innumerable sensors, complex deduction of contexts from sensor data, and reusability of contextual information impose the requirement of middleware for contextaware computing. Smart applications, hosted in myriad devices (e.g PDA, mobile, PCs), acquire different contexts from the middleware and act intelligently based on the available contexts in a context-aware computing environm...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملContext-aware Modeling for Spatio-temporal Data Transmitted from a Wireless Body Sensor Network
Context-aware systems must be interoperable and work across different platforms at any time and in any place. Context data collected from wireless body area networks (WBAN) may be heterogeneous and imperfect, which makes their design and implementation difficult. In this research, we introduce a model which takes the dynamic nature of a context-aware system into consideration. This model is con...
متن کاملA Graph-Based Approach to Context Matching
This paper presents the work in progress towards a simple, flexible and decentralized representation of context and for the detection of appropriate context-aware action. Continuing our previous work on decentralized multi-agent systems for the context-aware exchange of information, we propose a representation for context inspired from concept maps and conceptual graphs, and also a formalism fo...
متن کامل