Loureiro E, Ferreira G, Almeida H, Perkusich A (2007) Pervasive computing: what is it anyway? In: Lytras M, Naeve A (eds) Ubiquitous and pervasive knowledge and learning management: semantics, social networking and new media to their full potential, pp 1–34
Chapter
Google Scholar
Weiser M (1999) The computer for the 21st century. SIGMOBILE Mob Comput Commun Rev 3(3):3–11. doi:10.1145/329124.329126
Article
Google Scholar
Presser A, Farrel L (2008) UPnP device architecture. http://upnp.org/specs/arch/UPnP-arch-DeviceArchitecture-v1.1.pdf. Last access on May, 2008
Kumaran I, Kumaran SI (2001) Jini technology: an overview. Prentice-Hall PTR, Upper Saddle River
Google Scholar
Consortium S (1999) Salutation architecture specification. ftp://ftp.salutation.org/salutesa20e1a21.ps
Guttman E, Perkins C, Veizades J, Day M (1999) Service location protocol, version 2. RFC. http://tools.ietf.org/html/rfc2608
W3C (2007) Simple object access protocol. http://www.w3.org/TR/soap/
Langille G et al. (2008) Mediaserver:3 device template version 1.01. http://upnp.org/specs/av/UPnP-av-MediaServer-v3-Device.pdf. Last access on May, 2009
Guedes A, Santos D, do Nascimento J, Sales L, Perkusich A, Almeida H (2008) Set your multimedia application free with BRisa framework: an open source UPnP implementation for resource limited devices. In: 5th IEEE consumer communications and networking conference, 2008. CCNC 2008, pp 1257–1258 (10–12 January 2008). doi:10.1109/ccnc08.2007.297
Chapter
Google Scholar
Lin JC, Chen JM, Liu CH (2008) An automatic mechanism for adjusting validation function. AINAW, pp 602–607. 10.1109/WAINA.2008.89
Prakash Iyer UW (2001) Internetgatewaydevice:1 device template version 1.01. http://upnp.org/standardizeddcps/documents/UPnP_IGD_1.0.zip. Last access on May, 2009
Hengartner U, Steenkiste P (2004) Protecting access to people location information. In: Lecture notes in computer science, vol 2802. Springer, Berlin, pp 222–231
Google Scholar
Robinson P, Beigl M (2004) Trust context spaces: an infrastructure for pervasive security in context-aware environments. In: Lecture notes in computer science, vol 2802. Springer, Berlin, pp 119–129
Google Scholar
Kvarnstrom H, Hedbom H, Jonsson E (2004) Protecting security policies in ubiquitous environments using one-way functions. In: Lecture notes in computer science, vol 2802. Springer, Berlin, pp 71–85
Google Scholar
Creese S, Goldsmith M, Roscoe B, Zakiuddin I (2004) Authentication for pervasive computing. In: Lecture notes in computer science, vol 2802. Springer, Berlin, pp 439–488
Google Scholar
Klemets A, Da Costa B (2008) UPnP authentication and authorization patent. http://www.freepatentsonline.com/y2008/0092211.html
Karl J (2010) UPnP CDS USER PROFILE. http://www.patents.com/UPnP-CDS-USER-PROFILE-20100125907.html
Ellison C (2003) DeviceSecurity: 1 Service Template. http://www.upnp.org/standardizeddcps/documents/DeviceSecurity_1.0cc_001.pdf. Last access on December, 2008
Ellison C (2003) SecurityConsole: 1 service template. http://www.upnp.org/standardizeddcps/documents/SecurityConsole_1.0cc.pdf. Last access on December, 2008
Nakajima T (2003) Pervasive servers: a framework for creating a society of appliances. Pers Ubiquitous Comput 7(3–4):182–188. doi:10.1007/s00779-003-0222-2
Article
MathSciNet
Google Scholar
Chen W, Kuo SY, Chao HC (2009) Service integration with UPnP agent for an ubiquitous home environment. Inf Syst Front 11(5):483–490. doi:10.1007/s10796-008-9122-3
Article
Google Scholar
Sahm C, Langels HJ (2003) Dimmable light device template. http://www.upnp.org/standardizeddcps/documents/DimmableLight1.0cc.pdf. Last access on May, 2008
Kim K, Ko H, Choi W, Lee E, Kim U (2008) A collaborative access control based on XACML in pervasive environments. In: International conference on convergence and hybrid information technology, 2008. ICHIT’08, pp 7–13
Chapter
Google Scholar
Rahaman MA, Schaad A, Rits M (2006) Towards secure SOAP message exchange in a SOA. In: SWS’06: proceedings of the 3rd ACM workshop on secure web services. ACM, New York, pp 77–84. doi:10.1145/1180367.1180382
Chapter
Google Scholar
Snyder RM (2007) Security programming using python: man-in-the-middle attacks. In: InfoSecCD’07: proceedings of the 4th annual conference on information security curriculum development. ACM, New York, pp 1–6. doi:10.1145/1409908.1409911
Google Scholar
Hashemipour S, Ali M (2004) MPEG-21 & DIDL: dawn of a new multimedia EVA. In: IEEE international symposium on consumer electronics, 2004, pp 91–95
Chapter
Google Scholar
Balabanovic M, Shoham Y (1997) FAB: content-based, collaborative recommendation. Commun ACM 40:66–72
Article
Google Scholar
Im I, Hars A (2007) Does a one-size recommendation system fit all? The effectiveness of collaborative filtering based recommendation systems across different domains and search modes. ACM Trans Inf Syst TOIS 26(1):4. doi:10.1145/1292591.1292595
Article
Google Scholar
Deshpande M, Karypis G (2004) Item-based top-n recommendation algorithms. ACM Trans Inf Syst 22(1):143–177. doi:10.1145/963770.963776
Article
Google Scholar
Benesty J, Chen J, Huang Y (2008) On the importance of the Pearson correlation coefficient in noise reduction. IEEE Trans Audio Speech Lang Process 16(4):757–765. 10.1109/TASL.2008.919072
Article
Google Scholar
Minker J (1977) Information storage and retrieval: a survey and functional description. SIGIR Forum 12(2):12–108. doi:10.1145/1095515.1095516
Article
Google Scholar
Yantao Z, Jianbo T, Jiaqin W (2007) An improved TFIDF feature selection algorithm based on information entropy. In: Chinese control conference, 2007. CCC 2007, pp 312–315. doi:10.1109/CHICC.2006.4346845
Google Scholar
Sherwin L (2009) UPnP specifications named international standard for device interoperability for IP-based network devices. innovation validated by record-breaking number of UPnP implementations in 2008. http://www.upnp.org/news/documents/UPnPForum_02052009.pdf. Last access on September, 2009
Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772. doi:10.1145/358790.358797
Article
MathSciNet
Google Scholar
Malladi S, Alves-Foss J, Heckendorn RB (2002) On preventing replay attacks on security protocols. In: Proc international conference on security and management. CSREA Press, pp 77–83
Syverson P (1994) A taxonomy of replay attacks. In: Proceedings of the 7th IEEE computer security foundations workshop. Society Press, New York, pp 187–191
Google Scholar
Yan Y, Zhang J, Yan M (2006) Ontology modeling for contract: using OWL to express semantic relations. In: 10th IEEE international enterprise distributed object computing conference, 2006. EDOC’06, pp 409–412. doi:10.1109/EDOC.2006.37
Chapter
Google Scholar