An authorization and access control scheme for pervasive computing.
Linda StaffansTitos SaridakisPublished in: IASTED Conf. on Software Engineering (2004)
Keyphrases
- control scheme
- pervasive computing
- access control
- closed loop
- control system
- dynamic model
- ambient intelligence
- daily life
- mobile devices
- predictive control
- context aware
- control law
- control strategy
- robot manipulators
- mobile computing
- ubiquitous computing
- service discovery
- smart environments
- computing environments
- control loop
- context awareness
- fuzzy controller
- security policies
- pid controller
- pervasive environments
- pervasive computing environments
- smart home
- artificial neural networks
- data collection
- mobile phone
- position control