Patterns capture design knowledge, such as
guidelines and heuristics, in three ways.
First, patterns offer low-level solutions to
specific problems rather than providing high-level
and abstract suggestions. Second, patterns are
generative, helping designers create new solutions
by showing many examples of actual designs. Third,
patterns are linked to one another hierarchically
(structured), helping designers address high-level
problems as well as low-level ones. Patterns are
intended to complement guidelines and heuristics.
Patterns are simply another tool for helping
designers create high-quality solutions.
6 CONCLUSIONS
In this article, we define clear boundaries for PEISs
and we highlight the importance of ensuring
accessibility, security and interoperability by
applying an adaptive service oriented security policy
such as: RBAC. We show the challenges that face
the integration of different system sub components
and we stress on the importance of providing a
system that satisfies the user needs, simplifies his
interaction with highly advanced devices in highly
dynamic environments.
REFERENCES
Al Kukhun, D. and Sedes, F., 2006. “Towards a pervasive
computing benchmark”. In MAPS 06, Multimodal and
Pervasive Services Workshop, ICPS406, IEEE
Conference on Pervasive Services, IEEE, pp. 29-34.
Almenárez, F., Marín, A., Campo, C. and García, C.,
2005. “TrustAC: Trust-Based Access Control for
Pervasive Devices”. In The 2nd International
Conference on Security in Pervasive Computing,
Boppard, Germany, pp 225-238.
Campbel, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G.
and Mickunas, M. D. 2002. “Towards Security and
Privacy for Pervasive Computing”. In Proceedings of
International Symposium on Software Security, pp. 1-
15.
Chen, E., Zhang, D., Shi, Y. and Xu G., 2004. “Seamless
Mobile Service for Pervasive Multimedia”. In
PCM’05, 5th Pacific Rim Conference on Multimedia,
IEEE, pp.194-198.
Chung, E. S., Hong, J. I., Lin, J., Prabaker, M. K., Landay,
J. A. and Liu, A. L., 2004. “Development and
evaluation of emerging design patterns for ubiquitous
computing”. In 2004 conference on Designing
interactive systems: processes, practices, methods,
and techniques, Cambridge, MA, USA, pp. 233 - 242.
Davis, J., Tierney, A., Chang, E., 2005. “A User-
Adaptable User Interface Model to Support
Ubiquitous User Access to EIS Style Applications”. In
COMPSAC’05, The 29th Annual International
Computer Software and Applications Conference,
IEEE, pp. 351 – 358.
Duan, Y. and Canny, J., 2004. “Protecting User Data in
Ubiquitous Computing: Towards trustworthy
environments”. In PET’04, Privacy Enhancing
Technologies, Springer, pp. 167-185.
Graham, L., 1999. The principles of Interactive design. In
Delmar Publishing.
Gschwind, T., Jazayeri, M. and Oberleitner, J., 2002.
“Pervasive Challenges for Software Components”. In
RISSE’02, 9th International Workshop on Radical
Innovations of Software and Systems Engineering in
the Future, Springer, pp. 152-166.
Munoz, J. and Pelechano V., 2005. “Building a Software
Factory for Pervasive Systems Development”. In
Advanced Information Systems Engineering, Springer
Berlin / Heidelberg, pp. pp 342-356.
Niemela, E., Latvakoski, J., 2004. “Survey of
Requirements and Solutions for Ubiquitous Software”.
In The 3
rd
International Conference on Mobile and
Ubiquitous Multimedia, College Park, Maryland, pp
71 – 78.
OASIS, 2003. “A brief Introduction to XACML”. In
http://www.oasis-open.org/committees/download.php
/2713/Brief_Introduction_to_XACML.html , consulted
on april 2007.
OASIS, 2004. “Universal Business Language 1.0”. In
http://docs.oasis-open.org/ubl/cd-UBL-1.0 , consulted
on april 2007.
Park, I., Kim, W. and Park, Y., 2004. “A Ubiquitous
Streaming Framework for Multimedia Broadcasting
Service with QoS based mobility Support”. In
Information Networking, LNCS 3090 in Springer-
Verlag (SCI-E), pp.65-74.
Ranganathan, A., Al-Muhtadi, J., Biehl, J., Ziebart, B.
Campbell, R.H. and Bailey, B., 2005. “Towards a
pervasive computing benchmark”. In PerCom 2005,
Third IEEE International Conference on Pervasive
Computing and Communications, IEEE, pp.194-198.
Want, R., Pering, T., Borriello, G. and Farkas, K. 2002
“Disappearing hardware”. In Pervasive Computing,
IEEE, Vol 1, Issue 1, pp. 36 – 47.
Weiser, M., 1999. “The computer for the 21st century”, In
ACM SIGMOBILE Mobile Computing and
Communications Review, vol 3, ACM, pp. 3 - 11.
Yang, H., Jansen, E. and Helal, S., 2006. “A Comparison
of Two Programming Models for Pervasive
Computing”. In SAINT Workshops 2006, International
Symposium on Applications and the Internet, IEEE,
pp134 – 137.
Zimmermann, A., Lorenz, A. and Specht, M., 2005.
“Applications of a Context-Management System”, In
Modeling and Using Context, Springer Berlin/
Heidelberg, pp 556-569.
ICEIS 2007 - International Conference on Enterprise Information Systems
242