Ontology access patterns for pervasive computing environments

被引:0
|
作者
Villanueva, F. J. [1 ]
Villa, D. [1 ]
Barba, J. [1 ]
Rincon, F. [1 ]
Moya, F. [1 ]
Lopez, J. C. [1 ]
机构
[1] Univ Castilla La Mancha, Dept Informat Technol & Syst, E-13071 Ciudad Real, Spain
来源
关键词
Patterns; Pervasive Computing; Ontology; Web Services;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Lately, the use of ontologies for semantic description in pervasive systems has been researched and applied in numerous projects. The characteristic of this type of representation for data, services, interfaces, etc. allows the interaction between entities in a pervasive environment and then the development of advanced services. However, pervasive systems include a high number of mobile devices that have to access to several ontology-based information repositories with different representations, interfaces, etc. This fact limits the interaction capacity of mobile devices which have not been designed taking this interaction into account. In this paper we define an access extension for ontology-based pervasive systems that can be automatically generated. Based on the general structure of such systems and on the characteristics of the applications specifically developed to interact with them, we have derived several patterns in order to ease the information lookup and to allow a basic interaction with the system. In this way, we define a set of access patterns based in common structures and interactions. These patterns work in a similar way that design patterns do in software engineering. They are designed independently of the specific ontology implementation and representation. Finally, we present a tool that automatically generates a specific implementation of the defined patterns and we describe a prototype that uses this extension by means of Web Services.
引用
收藏
页码:236 / 244
页数:9
相关论文
共 50 条
  • [31] Agile middleware of pervasive computing environments
    Niemelä, E
    Vaskivuo, T
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 192 - 197
  • [32] Active Authentication for pervasive computing environments
    Matsumiya, K
    Aoki, S
    Murase, M
    Tokuda, H
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
  • [33] Context management in pervasive computing environments
    Anagnostopoulos, C
    Tsounis, A
    Hadjiefthymiades, S
    [J]. International Conference on Pervasive Services 2005, Proceedings, 2005, : 421 - 424
  • [34] Authentication-based access control approach for enhancing security in pervasive computing environments
    Gnaneshwari, G. R.
    Hema, M. S.
    Lingareddy, S. C.
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 211 - 232
  • [35] SCN-SI-021 Achieving privacy and access control in pervasive computing environments
    Magkos, Emmanouil
    Kotzanikolaou, Panayiotis
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (02) : 94 - 105
  • [36] Lightweight ontology-driven representations in pervasive computing
    Domaszewicz, J
    Rój, M
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 642 - 651
  • [37] Ontology-based models in pervasive computing systems
    Ye, Juan
    Coyle, Lorcan
    Dobson, Simon
    Nixon, Paddy
    [J]. KNOWLEDGE ENGINEERING REVIEW, 2007, 22 (04): : 315 - 347
  • [38] Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments
    Li, Chun-Ta
    Hwang, Min-Shiang
    Chu, Yen-Ping
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4255 - 4258
  • [39] A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments
    Tan, Zuowen
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1839 - 1846
  • [40] Privacy in pervasive computing environments - A contradiction in terms?
    Cas, J
    [J]. IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2005, 24 (01) : 24 - 33