Abstract
Human Computer Interaction (HCI) is to interaction between computers and each person. And context-aware (CA) is very important one of HCI composition. In particular, if there are sequential or continuous tasks between users and devices, among users, and among devices etc, it is important to decide the next action using right CA. And to take perfect decision we have to get together all CA into a structure. We define that structure is Context-Aware Matrix (CAM) in this article. However to make exact decision is too hard for some problems like low accuracy, overhead and bad context by attacker etc. Many researcher has been studying to solve these problems. Moreover, still it has weak point HCI using in safety. In this Article, we propose CAM making include best selecting Server in each area. As a result, moving users could be taken the best way.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ma, M., Woodhead, S.: Authentication delegation for subscription-based remote network services. Computers & Security 25, 371–378 (2006)
Aura, T.: Distributed Access Rights Management with Delegation Certificates. Secure Internet programming: security issues for mobile and distributed objects, 211–235 (2001)
Chadwick, D.W., Otenko, A., Ball, E.: Role-Based Access Control With X.509 Attribute Certificates. IEEE Internet Computing 7, 62–69 (2003)
Kim, H., Lee, Y., Chung, B., Yoon, H., Lee, J., Jung, K.: Digital Right management with right delegation for home networks. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 233–245. Springer, Heidelberg (2006)
Ramos, C., Augusto, J.C., Shapiro, D.: Ambient intelligence the next step for artificial intelligence. IEEE Intelligent Systems 23(2), 15–18 (2008)
Vu, T.H.N., Ryu, K.H., Park, N.: A method for predicting future location of mobile user for location-based services system. Computers & Industrial Engineering (2008)
Zhuang, X., Serrano, M.J., Cain, H.W., Choi, J.-D.: Accurate, Efficient, and Adaptive Calling Context Profiling. In: PLDI 2006, June 10-16, pp. 263–271 (2007)
Schilit, B., Adams, N., Want, R.: Context-Aware Computing Applications. In: 1st International Workshop on Mobile Computing Systems and Applications, pp. 85–90 (1994)
Dey, A.: Providing Architectural Support for Building Context-Aware Applications. PhD thesis, Georgia Institute of Technology, Georgia (November 2000)
Chen, G., Kotz, D.: A Survey of Context-Aware Mobile Computing Research. Technical Report: TR2000-381 Dartmouth College, Hanover, NH, USA (2007)
Lee, W.-P.: Deploying personalized mobile services in an agent-based Environment. Expert Systems with Applications, pp. 1194–1207 (2007)
Lee, B.-H., Kim, H.-N., Jung, J.-G., Jo, G.S.: Location-based service with context data for a restaurant recommendation. In: Bressan, S., Küng, J., Wagner, R. (eds.) DEXA 2006. LNCS, vol. 4080, pp. 430–438. Springer, Heidelberg (2006)
Ramos, C.: Ambient Intelligence – A State of the Art from Artificial Intelligence Perspective. In: Neves, J., Santos, M.F., Machado, J.M. (eds.) EPIA 2007. LNCS, vol. 4874, pp. 285–295. Springer, Heidelberg (2007)
Yang, S.J.H.: Context-Aware Ubiquitous Learning Environments for Peer-to-Peer Collaborative Learning. In: Educational Technology & Society, Security, pp. 188–201 (2006)
Vieira, M.S., Rosa, N.S.: A Reconfigurable Group Management Middleware Service for Wireless Sensor Networks. In: MPAC 2005, pp. 1–8 (November 2005)
IST Advisory Group, Scenarios for Ambient Intelligence in 2010, European Commission (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ko, H., Chen, N., Marreiros, G., Ramos, C. (2009). Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_85
Download citation
DOI: https://doi.org/10.1007/978-3-642-02617-1_85
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02616-4
Online ISBN: 978-3-642-02617-1
eBook Packages: Computer ScienceComputer Science (R0)