普适计算中位置感知服务的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
普适计算是信息空间与物理空间的融合,在这个融合的空间中人们可以随时随地和透明地获得数字化的服务;计算机本身将从人们的视线中消失,人们注意力的中心将回归到要完成的任务本身。位置是普适计算中非常重要的上下文信息,普适计算中设备的许多行为都与位置上下文相关联。智能家电自动感知用户所处的位置,并提供适当服务,例如自动打开用户附近的灯或将来电自动转接到离用户最近的固定电话等,所有这些应用都需要判断用户的位置,以及用户与设备之间的相对位置关系。因此,位置感知计算在普适计算研究中占据举足轻重的地位。本文对普适计算中的位置感知服务问题展开了研究。本文的主要研究内容与创新点如下:
     分析了现有国内外的室内小范围高精度位置感知定位系统,及其定位算法和定位技术。提出了一种基于超宽带的位置感知定位系统,采用极大似然距离估计法来定位,推导了超宽带距离估计的克拉-美罗CRLB下界,采用MATLAB进行了距离估计仿真。仿真结果表明:基于超宽带的极大似然距离估计定位系统的定位精度可以达到厘米级,对于位置感知定位是一种简便、有效的方法。
     分析了现有普适计算的位置模型,构建了一种新的基于本体的通用位置感知模型,将基于不同技术的定位感知系统集成到普适计算环境中。提出了位置感知模型本体LMO。LMO采用Web本体语言OWL描述了位置感知模型中涉及到的感知上下文的词汇,包括空间、时间、用户、安全策略。该模型通过统一的语义位置方式,实现位置感知上下文知识的共享和重用。
     采用本体推理机实现了位置感知上下文知识及其属性之间的推理。采用FaCT++推理机实现了LMO类的一致性检验,以及LMO类之间的分类推理。采用语义Web规则语言SWRL定义了属性与属性之间的关系。采用Jess Rule Engine规则引擎,对OWL+SWRL语言编写的规则实现了属性间的深层次推理。
     提出了基于使用控制UCON_(ABC)的上下文访问控制模型CACM。CACM不仅关心授权,而且引入了职责和条件。针对位置感知计算中三种典型的上下文访问控制应用,灵活扩展了三种组合子模型,包括使用前授权+使用前条件模型、主动权力+被动权力模式、和使用前授权+使用前职责模型,为位置感知上下文访问控制提供了一个崭新的解决思路。
     提出了位置感知计算中动态的、语义的安全策略管理机制,该机制在现有策略模型中加入了上下文提供者、本体服务两大部分。上下文提供者获得位置感知计算环境中各个实体的上下文变化。根据上下文的变化,本体服务主动更新相关策略信息,策略服务通过策略执行代理实现对被管理对象的动态操作。该机制解决了位置感知环境中既要保障信息共享和协作,又要保障信息安全和个人隐私之间的矛盾。
Pervasive computing, integrating of computer, communication and digital media technology, makes it possible to merge the physical world we are living in and the virtual world in the information space. The basic idea of pervasive computing is to embed computer into the living environment or tool of human, so as to make the computer invisible from users' sight and the users can only focus on their task instead of the computer. Location is an essential part of contextual information, which has turned out to be useful in many applications, particularly in determining position, navigation, routing, tracking, logistics, and monitoring of pervasive computing devices. For example, turning on the light near the user automatically, or transferring the phone to the nearest user and so on. All of these applications should be able to determine the user's position and the relative position to other devices. Consequently location-aware computing is one of the key but challenging areas of pervasive computing. In this dissertation, we focus on location-aware service in pervasive computing. Our approaches and contributions are given below.
     All of existing location-aware systems, positioning algorithms and positioning technologies are analyzed. The positioning system based on Ultra-wideband (UWB) is proposed. We deduce Cramer-Rao lower bound (CRLB) of UWB distance estimation, and estimate distances using maximum likelihood estimator (MLE). All results of our work are simulated by MATLAB. These results demonstrate that the positioning system based on UWB successfully reaches centimeter scale in precision, and MLE is a simple and effective method for location-aware positioning.
     After analyzing the existing location models, we construct a novel location-aware model based on ontology, which can integrate heterogeneous location-aware positioning systems into pervasive computing environment. The Location-aware Model Ontology (LMO) is also proposed in this dissertation. By using the Web Ontology Language (OWL), LMO describes location-aware context vocabularies including space, time, user profiles, and policies for security and privacy. So the location-aware information can be defined exactly, expressed clearly, and organized effectively in a uniform semantic mode. Context knowledge can be shared and re-used in security.
     The reasoning between the location-aware context knowledge and its properties is carried through using ontology reasoner. By using FaCT++ (Fast Classification of Terminologies) reasoner, the classification hierarchy for the LMO classes is calculated, and inconsistencies of the LMO classes are checked. The relationships among the properties are defined through the rules coded in OWL and SWRL (Semantic Web Rule Language). The deeper reasoning of properties' relationships is performed by Jess Rule Engine.
     A context access control model (CACM) based on UCON_(ABC) (Usage CONtrol) is presented. CACM not only focuses on authorization, but also introduces obligations, and conditions. Three integrated sub-models are extended flexibly, including pre-authentication & pre-condition model, active-provision & passive-provision model, and pre-authentication & pre-obligation model. The security, usefulness and flexibility of CACM are demonstrated by three typical location-aware application scenarios.
     A dynamic and semantic security policy management mechanism for location-aware computing is presented. The mechanism extends the existing policy model by importing context provider and ontology service. The context changes of various entities in location-aware computing environment can be obtained by context provider. According to the context changes, ontology service updates the information of policy service and event service automatically. Then policy service adjusts the action on the managed targets by policy enforcement agent dynamically. The mechanism solves the contradiction between information sharing and security privacy in the location-aware computing environment.
引文
[1] M. Weiser, J.S. Brown. The Coming Age of Calm Technology. 1997. Springer-Verlag, New York.
    [2] M. Weiser. The Computer for the 21st Century. Science America, 1991. 265(3): 94-104.
    [3] M. Weiser, R. Gold, J.S. Brown. The Origins of Ubiquitous Computing Research at PARC in the 1980s. IBM Systems Journal, 1999. 38(4): 693-696.
    [4] R. Want, A. Hopper, V. Falcao. The Active Badge Location System. ACM Transactions on Information Systems, 1992. 10(1): 91-102.
    [5] MIT Project Oxygen: pervasive, human-centered computing. In: MIT Computer Science and Artificial Intelligence Laboratory 2004.
    [6] D.S. D. Garlan, A. Smailagic, and P. Steenkiste. Project Aura: Towards Distraction-Free Pervasive Computing. IEEE Pervasive Computing, 2002. 1(2): 22-31.
    [7] U. Hengartner, P. Steenkiste. Implementing access control to people location information. In: 9th ACM Symposium on Access Control Models and Technologies (SACMAT'04). Yorktown Heights. 2004.
    [8] Gaia: active space for ubiquitous computing. In: Department of Computer Science, University Of Illinois at Urbana-Champaign, 2003.
    [9] S. Chetan, A. Ranganathan, R.H. Campbell. Towards Fault Tolerant Pervasive Computing. IEEE Technology and Society, 2005. 24(1): 38-44.
    [10] The Endeavour Expedition: Charting the Fluid Information Utility. In: Electrical Engineering and Computer Science Department, University of California, Berkeley, Berkeley,USA, 1999-Jul 22
    
    [11] Portolano: An Expedition into Invisible Computing. In: Department of Computer Science & Engineering, University of Washington, Seattle, 2002.
    [12] Easy Living. In: Microsoft Research, 2003.
    [13] G. DeJean. Wireless Evanescent Coupling and its Connection to the Latest Developments Presented by Researchers at MIT. From:
    
    http://research.microsoft.com/research/pubs/view.aspx?0rc=p&type=technical+report&id=1386, 2007-9-11
    [14] Disappearing computer. In: The Disappearing Computer Initiative funded by Europe Union(EU), 2002.
    [15] Smart Classroom. In: Key Laboratory of Pervasive Compting,Tsinghua University,Ministry of Education Beijing, China, 2003.
    [16] D.S. David Garlan, Asim Smailagic, Peter Steenkiste. Project Aura: Towards Distraction-Free Pervasive Computing. IEEE Pervasive Computing, 2002. 21(2): 22-31.
    [17]A.Schmidt,L.Terrenghi,P.Holleis.Methods and guidelines for the design and development of domestic ubiquitous computing applications.Pervasive and Mobile Computing,2007.3(6):721-738.
    [18]F.W.Bruns.Ubiquitous computing and interaction.Annual Reviews in Control,2006.30(2):205-213.
    [19]T.M.M.Schilit B N.Disseminating active map information to mobile hosts.IEEE Network,1994.8(5):22-32.
    [20]B.J.BROWN PG,CHEN X.Context-aware applications from the laboratory to the marketplace.IEEE Personal Communications,1997.4(5):58-64.
    [21]P.J.BReZILLON P.Contextual knowledge sharing and cooperation in intelligent assistant systems.Le Travail Humain,1999.62(3):223 - 246.
    [22]D.AK.Providing Architectural Support for Building Context-Aware Applications.In:College of Computing,Georgia Institute of Technology,2000.
    [23]M.E.ABOWD G.Charting Past,Present,and Future Research in Ubiquitous Computing.ACM Transactions on Computer-Human Interaction,2000.7(1):29-58.
    [24]A.N.Schilit B,Want R.Context-aware computing applications.In:Proceedings of the IEEE Workshop on Mobile Computing System and Application.Santa Cruz,CaIifomia,US:IEEE Computer Society Press.1994:85-90.
    [25]徐光祐,史元春,谢伟凯.普适计算.计算机学报,2003.26(9):1042-1050.
    [26]P.-R.J.MOSTeFAOUI GK,BReZILLON P.Context-Aware Computing A Guide for the Pervasive Computing Community.In:IEEE/ ACS International Conference on Pervasive Services.2004.
    [27]E.D,C.D,P.K.Connecting the Physical World with Pervasive Networks.IEEE Pervasive Computing,2002.1(1):59 - 69.
    [28]E.G.Service Location Protocol Automatic Discovery of IP Network Services.IEEE Internet Computing,1999.3(4):71-80.
    [29]P.C.GUTTMAN E,VEIZADES J,et al.RFC 2608,Service Location Protocol.IETF,1999.
    [30]J.WALDO.The jini architecture for network - centric computing.Communications of the ACM,1999.42(7):76 - 82.
    [31]S.B.Mokhtar,N.Georgantas,V.Issarny.COCOA:COnversation-based service Composition in pervAsive computing environments with QoS support.Journal of Systems and Software,2007.80(12):1941-1955.
    [32]T.Rakotoarivelo,P.Senac,A.Seneviratne,et al.SPAD:A distributed middleware architecture for QoS enhanced alternate path discovery.Computer Networks,2007.51(14):4189-4211.
    [33]S.B.Mokhtar,D.Preuveneers,N.Georgantas,et al.EASY:Efficient semAntic Service discoverY in pervasive computing environments with QoS and context support.Journal of Systems and Software,2007.In Press,Corrected Proof, Available online 10 August
    [34] HAVi Consortium. HAVi Specification V1.0, 2000.
    [35] L.T. EUSTICE KF, MORALES A, et al. A universal information appliance. IBM Systems Journal, 1999. 38(4).
    [36] S. CZERWINSKI, B. ZHAO, T. HODES. An Architecture for a Secure Service Discovery Service In: Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'99). 1999: 24-35.
    [37] H. Cai, F. Pu, R. Huang, et al. A novel ANN-based service selection model for ubiquitous computing environments. Journal of Network and Computer Applications, 2007. In Press, Corrected Proof, Available online 23.
    [38] H. Cai, D. Sun, Q. Cao, et al. A Novel BP Algorithm Based on Three-term and Application in Service Selection of Ubiquitous Computing. In: The 9th International Conference on Control, Automation, Robotics and Vision. Singapore. 2006: 555-560.
    [39] M. RE. Discovery and Its Discontents Discovery Protocols for Ubiquitous Computing. In: Department of Computer Science, University of Illinois Urbana-Champaign, 2000.
    [40] D.N. FRIDAY A, CATTERALL E. Supporting service discovery, querying and interaction in ubiquitous computing environments. In: 2nd ACM International Workshop on Data Engineering for Wireless and Mobile Access (MobiDE 2001). 2001:7-13.
    [41] F. A. Coordination in Pervasive Computing Environments. In: Proceedings of the Twelfth International Workshop on Enabling Technologies Infrastructure for Collaborative Enterprises. 2003.
    [42] M.M. MAMEI M, LEONARDI L, et al. Motion Coordination for Ubiquitous Agents. In: Workshop on Ubiquitous Agents on embedded, wearable, and mobile devices (AAMAS 2002). 2002.
    [43] Z.F. MAMEI M, LEONARDI L. Co-Fields. A Physically Inspired Approach to Distributed Motion Coordination. IEEE Pervasive Computing, 2004. 3(2): 10-19.
    [44] O. Kwon, J.M. Shin, S.W. Kim. Context-aware multi-agent approach to pervasive negotiation support systems. Expert Systems with Applications, 2006. 31(2): 275-285.
    [45] L.V. PRASAD MVN. Learning Situation-Specific Coordination in Cooperative Multi-agent Systems. Autonomous Agents and Multi-Agent Systems, 1999. 2(2): 173-207.
    [46] J.N. WOOLDRIDGE M. Intelligent agents theory and practice. Knowledge Engineering Review, 1995. 10(2): 115-152.
    [47] W. M. Semantic Issues in the Verification of Agent Communication Languages. Autonomous Agents and Multi-Agent Systems, 2000. 2(1): 9-31.
    [48] S.K. JENNINGS NR, WOOLDRIDGE M. A Roadmap of Agent Research and Development Autonomous Agents and Multi-Agent Systems, 1998. 1(1): 275 - 306.
    [49]M.H.Coen,B.Phillips,N.Warshawsky,et al.Meeting the Computational Needs of Intelligent Environments The Metaglue System.In:Proceedings of MANSE'99.Dublin,Ireland.1999.
    [50]C.A.MARTIN D,MORAN D.The open agent architecture A framework for building distributed software systems.Applied Artificial Intelligence An International Journal,1999.13(1-2):91-128.
    [51]X.Weikai,S.Yuanchun,X.Guanyou,et al.Smart classroom - An intelligent environment for tele-education.In:Proceedings of the 2nd IEEE Pacific Rim Conference On Multimedia:Springer-Verlag.2001:662 - 668.
    [52]D.Sun,H.Cai,Q.Cao,et al.Ubiquitous Computing Trust Mechanism Based on D-S Evidence Theory.Journal of Dynamics of Continuous,Discrete and Impulsive Systems,Series B;International Conference on Sensing,Computing and Automation(ICSCA2006),2006:1240-1245.
    [53]A.-M.J.CAMPBELL R,NALDURG P,et al.Towards Security and Privacy for Pervasive Computing.In:International Symposium on Software Security.Tokyo,Japan.2002.
    [54]I.Maglogiannis,S.Hadjiefthymiades.EmerLoc:Location-based services for emergency medical incidents.International Journal of Medical Informatics,2007.76(10):747-759.
    [55]付维权,孙志仁,曹奇英.普适计算及其定位感知系统 计算机工程与设计,2004.25(7):1200-1203.
    [56]A.P.Patil,D.J.Kim,L.M.Ni.A Study of Frequency Interference and Indoor Location Sensing with 802.11b and Bluetooth Technologies.International Journal of Mobile Communications,2006.4(6):621-644.
    [57]S.B.Lee H,Youn H.A Study on the Indoor Real-time Tracking System to Reduce the Interference Problem.In:6th International Conference on Computational Science(ICCS 2006).England.2006:910-917.
    [58]W.J.An X,Prasad R,et al.OPT - Online Person Tracking System for Context-awareness in Wireless Personal Network.In:REALMAN 2006 - 2nd International Workshop on Multi-hop Ad Hoc Networks:from Theory to Reality.Florence,Italy.2006:47-54.
    [59]C.J.Chan L,Chen Y,et al.Collaborative Localization:Enhancing WiFi-based Position Estimation with Neighborhood Links in Clusters.In:4th International Conference on Pervasive Computing.Dublin,Ireland.2006:50-66.
    [60]S.Y.Gu H,Chen Y,et al.Cicada:a Highly-precise Easy-embedded and Omni-directional Indoor Location Sensing System.In:1st International Conference on Grid and Pervasive Computing.Taichung,Taiwan.2006:385-394.
    [61]A.Varshavsky,E.d.Lara,J.Hightower,et al.GSM indoor localization.Pervasive and Mobile Computing,2007.3(6):698-720.
    [62]A.Harter,A.Hopper,P.Steggles.The Anatomy of a Context-Aware Application. In:Proc.5th Ann.Int'l Conf.Mobile Computing and Networking(Mobicom 99).New York:ACM Press.1999:59-68.
    [63]A.C.N.B.Priyantha,H.Balakrishnan.The Cricket Location-Support System.In:Proc.6th Ann.Int'l Conf.Mobile Computing and Networking(Mobicom 00).New York:ACM Press.2000:32-43.
    [64]V.P.P.Bahl.RADAR:An In-Building RF-Based User Location and Tracking System.In:Proc.IEEE Infocom Los Alamitos,Calif.:IEEE CS Press.2000:775-784.
    [65]Technical Description of DC Magnetic Trackers.In:Ascension Technology Corp.,Burlington,Vt.,2001.
    [66]S.H.John Krumm,Brian Meyers.Multi-Camera Multi-Person Tracking for Easy Living.In:Proc.Third IEEE International Workshop Visual Surveillance.Piscataway,N.J.:IEEE Press.2000:3-10.
    [67]R.J.Orr,G.D.Abowd.The Smart Floor:A Mechanism for Natural User Identification and Tracking.In:Proc.2000 Conf.Human Factors in Computing Systems(CHI 2000).New York:ACM Press.2000:1-6.
    [68]R.Bandelloni.Bluetooth Indoor Positioning System(BIPS).From:http://www.wilmaproject.org/publications/BIPS.pdf,Trento,2002-10-3
    [69]Introduction to Ubisense.From:http://www.ubisense.net,2004-05
    [70]曹奇英.普适计算中位置感知研究.In:东华大学计算机学院,上海,2004.
    [71]李彩霞,曹奇英,蒲芳.普适计算中的室内位置感知.计算机工程,2005.31(21):153-155.
    [72]李彩霞.普适计算中的室内位置感知,东华大学计算机学院.硕士论文.上海,2005.
    [73]李彩霞,曹奇英.普适计算中的上下文及纯方位定位模型.计算机工程与设计,2005.26(1):50-52.
    [74]蒲芳,孙道清,曹奇英.位置感知应用中的超宽带距离估计.In:信息与控制上海研究生学术论坛.上海.2006-5-12:17-21.
    [75]梁虹,梁洁,陈跃斌.信号与系统分析及MATLAB实现.2002.电子工业出版社,北京.
    [76]薛年喜.MATLAB在数字信号处理中的应用.2003.清华大学出版社,北京.
    [77]B.V.R.Sauder R,Fensel D.Knowledge Engineering,Principles and methods.Data and Knowledge Engineering,1998.25(1-2):161-197.
    [78]N.J.Nilsson.Artificial Intelligence:A New Synthesis.1999.China Machine Press & Morgan Kaufmann,Beijing.
    [79]S.Russell,P.Norvig.Artifical Intelligence:A modern approach.2002.People's Posts & Telecommunications Press,Beijing.
    [80]张维明,宋峻峰.面向语义Web的领域本体表示、推理与集成研究.计算机研究与发展,2006.43(1):101-108.
    [81]T.Berners-Lee,J.Hendler,O.Lassila.The Semantic Web.Scientific American,2001.284(5):34-43.
    [82]M.K.Smith,C.Welty,D.L.McGuinness.OWL Web Ontology Language Guide,W3C Recommendation.From:http://www.w3.org/TR/owl-guide/,2004-2-10
    [83]F.J.Gonzalez-Castano,J.Garcia-Reinoso,F.Gil-Castineira,et al.Bluetooth-assisted Context-awareness in Educational Data Networks.Computers & Education,2005.45(1):105-121.
    [84]R.Want,B.Schilit,A.Norman,et al.An Overview of the Parctab Ubiquitous Computing Experiment.IEEE Personal Communications,1995.12(6):28-43.
    [85]T.Z.M.Beigl,C.Decker.A Location Model for Communicating and Processing of Context.Personal and Ubiquitous Computing,2002.6(5-6):341-357.
    [86]I.Satoh.A Location Model for Ambient Intelligence.In:Proceedings of the 2005 joint conference on Smart objects and ambient intelligence:innovative context-aware services:usages and technologies.Grenoble.2005.
    [87]I.Satoh.A Location Model for Smart Environments.Pervasive and Mobile Computing,2007.3(2):158-179.
    [88]D.B.Lenat,R.V.Guha.Building Large Knowledge-Based Systems:Representation and Inference in the Cyc Project.1990.Addison-Wesley,10-17.
    [89]D.Brickley,L.Miller.FOAF Vocabulary Specification(Revision:1.113 edition).From:http://xmlns.com/foaf/0.1/,2007-01-14
    [90]F.Pan,J.R.Hobbs.Time in OWL-S.In:Proceedings of AAAI-04 Spring Symposium on Semantic Web Services.Stanford,CA,United States.2004:29-36.
    [91]H.Chen,T.Finin,A.Joshi.The SOUPA ontology for pervasive computing.In:Ontologies for Agents:Theory and Experiences:Springer.2005:233-258.
    [92]H.Chen,T.Finin,A.Joshi.An Ontology for Context-aware Pervasive Computing Environments.Knowledge Engineering Review,2003.18(3):197-207.
    [93]H.Chen,F.Perich,T.Finin,et al.SOUPA:Standard ontology for ubiquitous and pervasive applications.In:1st Annual International Conference on Mobile and Ubiquitous Systems(MOBIQUITOUS 2004).Boston,MA.2004:258-267.
    [94]F.Perich.MoGATU BDI Ontology.From:http://mogatu.umbc.edu/bdi,University of Maryland,Baltimore County 2004-1-31
    [95]L.Kagal.Rei:A Policy Language for the Me-Centric Project.In:HP Labs,2002-9-15.
    [96]L.Kagal,T.Finin,A.Joshi.A Policy Language for a Pervasive Computing Environment.In:IEEE 4th International Workshop on Policies for Distributed Systems and Networks(POLICY'03).2003:61-69.
    [97]E.Christopoulou,A.Kameas.GAS Ontology:An ontology for collaboration among ubiquitous computing devices.International Journal of Human-Computer Studies,2005.62(5):664-685.
    [98]D.Tsarkov.Fact++.From:http://owl.man.ac.uk/factplusplus/,School of Computer Science,University of Manchester,2007-7-5
    [99]V.Haarslev,R.Moller,M.Wessel.RACER User's Guide and Reference Manual(Version 1.7.19).From: http://coli.lili.uni-bielefeld.de/~felix/lehre/ws04_05/ontologischeRessourcen/addLiterature/haarslev-und-moeller04.pdf, 2004-4-26
    [100] J.H. Gennari, M.A. Musen, R.W. Fergerson, et al. The evolution of protege: an environment for knowledge-based systems development. Journal of Human-Computer Interaction, 2003. 58(1): 89-123.
    [101] H. Knublauch, R.W. Fergerson, N.F. Noy, et al. The Protege OWL plug-in: an open development environment for semantic web applications. In: Proceedings of the Third International Semantic Web Conference (ISWC 2004). Hiroshima, Japan. 2004.
    [102] SWRLJessTab. From: http://protege.cim3.net/cgi-bin/wiki.p1?SWRLJessTab, 2007-3-13
    [103] I. Horrocks, P.F. Patel-Schneider, H. Boley, et al. SWRL: A Semantic Web Rule Language Combining OWL and RuleML. From: http://www.w3.org/Submission/SWRL/, 2004-05-21
    [104] R. Bhatti, E. Bertino, A. Ghafoor. Jess, the Rule Engine for the Java Platform. From: http://herzberg.ca.sandia.gov/iess/.2007-7-19
    [105] CLISP. From: http://clisp.cons.org/. 2006-10-13
    [106] R.S. Sandhu, P. Samarati. Access Control: Principles and Practice IEEE Communications Magazine, 1994. 32(9): 40-48.
    [107] R.S. Sandhu, E.J. Coyne, H.L. Feinstein, et al. Role based access control models. IEEE Computer, 1996. 29(2): 38-47.
    [108] D.F. Ferraiolo, R. Sandhu, S. Gavrila. Proposed NIST standard for role-based access control. ACM Trans, on Information and Systems Security (TISSEC), 2001. 4(3): 224-274.
    [109] R.K. Thomas, R.S. Sandhu. Task-base Authorization Controls(TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. In: Proc. of the IFIP WG11.3 Workshop on Database Security. California. 1997.
    [110] R.S. Sandhu. The NTree: A Two Dimension Partial Order for Protection Groups. Journal Title: ACM Transactions on Computer Systems, 1988. 6(2): 197 - 222.
    [111] J. Park, R. Sandhu. The UCONABC Usage Control Model. ACM Transactions on Information and System Security (TISSEC), 2004. 7(1): 128-174.
    [112] R. Sandhu, J. Park. Usage Control: A Vision for Next Generation Access Control. In: The Second International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS). Petersburg, Russia: Springer. 2003: 17-31.
    [113] J. Park, X. Zhang, R. Sandhu. Attribute Mutability in Usage Control. 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2004. 11(3): 1-12.
    [114] J. Park, R. Sandhu. Towards Usage Control Models: Beyond Traditional Access Control. In: Proceedings of the 7th ACM Symposium on Access Control Models and technologies (SACMATr02). Monterey, California, USA: ACM. 2002: 57-64.
    [115] J. Park, R. Sandhu. Originator Control in Usage Control. In: Proceedings of 3rd International Workshop on Policies for Distributed Systems and Networks. 2002: 60-66.
    [116] M. J. Moyer, M.J. Covington, M. Ahamad. Generalized role-based access control for securing future applications. In: 23rd National Information Systems Security Conference. (NISSC 2000). Baltimore, Md, USA. 2000.
    [117] M.J. Covington, P. Fogla, Z. Zhan, et al. A context-aware security architecture for emerging applications. In: 18th Annual Computer Security Applications Conference (ACSAC). Las Vegas, Nevada, USA. 2002: 249-258.
    [118] J. Kwon, C.J. Moon. Visual modeling and formal specification of constraints of RBAC using semantic web technology. Knowledge-Based Systems, 2007. 20(4): 350-356.
    [119] J. Al-Muhtadi, A. Ranganathan, R. Campbell, et al. A flexible, privacy-preserving authentication framework for ubiquitous computing environments. In: the 22nd International Conference on Distributed Computing Systems Workshops(ICDCSW'02): IEEE Computer Society. 2002: 771-776.
    [120] J. Al-Muhtadi, A. Ranganathan, R. Campbell, et al. Cerberus: a context-aware security scheme for smart spaces. the First IEEE International Conference on Pervasive Computing and Communications(PerCom 2003), 2003: 489 -496.
    [121] J. Hu, A.C. Weaver. A Dynamic, Context-Aware Security Infrastructure for Distributed Healthcare Applications. In: the First Workshop on Pervasive Privacy Security, Privacy, and Trust (pspt2004). Boston, MA, USA. 2004.
    [122] Y. Han. CASPEr Context Aware Security Policy Enforcement. Department of Mathematics and Computer Science, TECHNISCHE UNIVERSITEIT. Master Thesis. EINDHOVEN, 2005.
    [123] J. Xiaodong, J.A. Landay. Modeling privacy control in context-aware systems. IEEE Pervasive Computing, 2002. 1(3): 59 - 63.
    [124] K. Nakanishi, J. Nakazawa, H. Tokuda. LEXP: Preserving User Privacy and Certifying the Location Information. In: The 2nd Workshop on Security at the Ubicomp 2003 Conference. 2003.
    [125] H. Wang, Y. Zhang, J. Cao. Access control management for ubiquitous computing. Future Generation Computer Systems, 2007. In Press, Corrected Proof, Available online 3 August
    [126] P. Fang, S. Dao-qing, C. Qi-ying, et al. Pervasive Computing Context-Aware Usage Control Based on UCONABC Model. In: Proceeding of 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal (IIHMSP-2006). Pasadena, CA, USA: IEEE Computer Society. 2006: 689-692.
    [127] N. Damianou, N. Dulay, E. Lupu, et al. The Ponder Policy Specification Language. In: Workshop on Policies for Distributed Systems and Networks. Bristol, UK: Springer-Verlag. 2001: 18-39.
    [128] B. Moore, E. Ellesson, J. Strassner, et al. Policy Core Information Model -- Version 1 Specification.From:http://www.ietf.org/rfc/rfc3060.txt,2001-2
    [129]A.Uszok,J.Bradshaw,R.Jeffers,et al.KAoS Policy and Domain Services:Toward a Description-Logic Approach to Policy Representation,Deconfliction,and Enforcement.In:IEEE 4th International Workshop on Policies for Distributed Systems and Networks.Lake Como,Italy.2003:93- 96.
    [130]G.Tonti,J.M Bradshaw,R.Jeffers,et al.Semantic Web Languages for Policy Representation and Reasoning:A Comparison of KAoS,Rei,and Ponder.In:the Second International Semantic Web Conference.Sanibel Island,Florida:Springer Verlag.2003:419-437.
    [131]H.Gu,Y.Shi,Y.Chen.Cicada:A highly-precise easy-embedded and omnidirectional indoor location sensing system.Lecture Notes in Computer Science,2006.3947:385-394.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700