Toward a Shared Model for Wide Area Interoperability of Ubiquitous Computing Environments
نویسندگان
چکیده
Despite many years of ubiquitous computing (ubicomp) middleware research, deployment of such systems has not been widespread. For such systems to become more widely adopted, we argue that a shared model for ubicomp environments, and a system to bridge such environments between network and administrative domains is needed. This paper presents work in progress toward deriving a shared environment model based on an analysis of several existing ubicomp systems. This model is designed for use in an integrated middleware platform used to adapt existing ubicomp systems for wide area application interaction. Together the model and platform highlight the benefits of Web Services and Semantic Web technologies for exposing ubicomp environments to applications outside administrative domains.
منابع مشابه
GTrust: a group based trust model
Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...
متن کاملAdapting Ubicomp Systems to a Common Model
Until recently, system designers have focused primarily on supporting applications and user access to integrated ubiquitous computing environments or “smart spaces” within single administrative or network domains. We believe that the wider deployment of ubicomp systems will be more viable when applications can interact with devices, services and sensor information independent of their environme...
متن کاملYours, Mine and Ours? Sharing and Use of Technology in Domestic Environments
Domestic technologies have been a popular area of study for ubiquitous computing researchers, however there is relatively little recent data on how families currently use and share technologies in domestic environments. This paper presents results from an empirical study of 15 families in the U.S in early 2007. We examined the types of technologies families own, including TVs, music players, ph...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملSecurity Threats in Cloud Computing Environments
Cloud computing is a model for enabling service user’s ubiquitous, convenient and on-demand network access to a shared pool of configurable computing resources. The security for Cloud Computing is emerging area for study and this paper provide security topic in terms of cloud computing based on analysis of Cloud Security treats and Technical Components of Cloud Computing.
متن کامل