Federation and Sharing in the Context Marketplace

  • Carsten Pils
  • Ioanna Roussaki
  • Tom Pfeifer
  • Nicolas Liampotis
  • Nikos Kalatzis
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4718)


The emerging pervasive computing services will eventually lead to the establishment of a context marketplace, where context consumers will be able to obtain the information they require by a plethora of context providers. In this marketplace, several aspects need to be addressed, such as: support for flexible federation among context stakeholders enabling them to share data when required; efficient query handling based on navigational, spatial or semantic criteria; performance optimization, especially when management of mobile physical objects is required; and enforcement of privacy and security protection techniques concerning the sensitive context information maintained or traded. This paper presents mechanisms that address the aforementioned requirements. These mechanisms establish a robust spatially-enhanced distributed context management framework and have already been designed and carefully implemented.


Context Distributed Database Management System context databases & query languages federation spatially-enhanced distributed context management mobile physical object handling context privacy & security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Baldauf, M., Dustar, S., Rosenberg, F.: A Survey on Context-Aware Systems. International Journal of Ad Hoc and Ubiquitous Computing 2(4), 263–277 (2007)CrossRefGoogle Scholar
  2. 2.
    Abowd, G.D., Mynatt, E.D., Rodden, T.: The Human Experience. IEEE Pervasive Computing 1(1), 48–57 (2002)CrossRefGoogle Scholar
  3. 3.
    Lu, H., Ooi, B.C.: Spatial Indexing: Past and Future. IEEE Data Engineering Bulletin 16(3), 16–21 (1993)Google Scholar
  4. 4.
    Yeung, A.K.W., Hall, G.B.: Spatial Database Systems: Design, Implementation and Project Management. Springer, Series: GeoJournal Library 87 (2007)Google Scholar
  5. 5.
    Vögel, H.J., Weyl, B., Eichler, S.: Federation solutions for inter- and intradomain security in next-generation mobile service platforms, AEÜ. Journal of Electronics and Communications 60(1), 13–19 (2006)Google Scholar
  6. 6.
    Open Geospatial Consortium Inc.: Simple Feature access–Part 2: SQL Option. v.1.1.0 (2005)Google Scholar
  7. 7.
    Roussaki, I., Strimpakou, M., Pils, C.: Distributed Context Retrieval and Consistency Control in Pervasive Computing. Journal of Network and Systems Management 15(1), 57–74 (2007)CrossRefGoogle Scholar
  8. 8.
    Mondal, A.S.: Present State and Future. Springer, Series in Computer Science. Springer, Heidelberg (2003)Google Scholar
  9. 9.
    Cai, Y., Hua, K.A., Cao, G.H., Xu, T.: Real-time processing of range-monitoring queries in heterogeneous mobile databases. IEEE Transactions on Mobile Computing 5(7), 931–942 (2006)CrossRefGoogle Scholar
  10. 10.
    Bopanna, R.B., Hastad, J., Zachos, S.: Does co-np have short interactive proofs? Information Processing Letters 25(2), 127–132 (1987)CrossRefGoogle Scholar
  11. 11.
    Hopcroft, J.E., Wong, J.K.: Linear time algorithm for isomorphism of planar graphs. In: 6th Annual ACM symposium on Theory of computing, Washington, USA, pp. 172–184 (1974)Google Scholar
  12. 12.
    Berglund, A., Boag, S., Chamberlin, D., Fernandez, M.F., Kay, M., Robie, J., Simeon, J.: XML Path Language(XPath) 2.0 W3C Recommendation (2007),
  13. 13.
    Grust, T., van Keulen, M., Teubner, J.: Accelerating Xpath Evaluation in Any RDBMS. ACM Transactions on Database Systems 29, 91–131 (2004)CrossRefGoogle Scholar
  14. 14.
    XSB at sourceforge (2006),
  15. 15.
    Gottlob, G., Grädel, E., Veith, H.: Datalog LITE: A deductive query language with linear time model checking. ACM Trans. on Computational Logic 3(1), 42–79 (2002)CrossRefGoogle Scholar
  16. 16.
    Conceptbase, A.: Database System for Meta Modelling and Method Engineering (v7) (2007),
  17. 17.
    Westin, A.F.: Privacy and Freedom. H. Wolff, New York (1967)Google Scholar
  18. 18.
    Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology. Version 0.28 (2006),
  19. 19.
    Porekar, J., Dolinar, K., Jerman-Blazic, B.: Middleware for Privacy Protection of Ambient Intelligence and Pervasive Systems. WSEAS Transaction on Information Science and Applications 4(2), 633–641 (2007)Google Scholar
  20. 20.
    XACML: A New Standard Protects Content in Enterprise Data Exchange (2003),
  21. 21.
    Dolinar, K., Porekar, J., Jerman-Blazic, A., Klobucar, T.: Pervasive systems: enhancing trust negotiation with privacy support. In: International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks, Miami, Florida, pp. 1–10 (2006)Google Scholar
  22. 22.
    Jerman-Blazic, A., Dolinar, K., Porekar, J.: Enabling Privacy in Pervasive Computing Using Fusion of Privacy Negotiation, Identity Management and Trust Management Techniques. In: 1st International Conference on the Digital Society, pp. 30–35. Guadeloupe, French Caribbean (2007)Google Scholar
  23. 23.
    Dey, A., Salber, D., Abowd, G.: A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications. Human-Computer Interaction Journal 16(2-4), 97–166 (2001)CrossRefGoogle Scholar
  24. 24.
    Beigl, M., Gellersen, H.W., Schmidt, A.: Mediacups: Experience with design and use of computer-augmented everyday objects. Elsevier Computer Networks 35(4), 401–409 (2001)CrossRefGoogle Scholar
  25. 25.
    Garlan, D., Siewiorek, D., Smailagic, A., Steenkiste, P.: Project Aura: Towards Distraction-Free Pervasive Computing. IEEE Pervasive Computing 1(2), 22–31 (2002)CrossRefGoogle Scholar
  26. 26.
    Kindberg, T., Barton, J., et al.: People, Places, Things: Web Presence for the Real World. ACM Mobile Networks & Applications Journal 7(5), 365–376 (2002)zbMATHCrossRefGoogle Scholar
  27. 27.
    Lei, H., Sow, D.M., Davis, II.: The design and applications of a context service. ACM SIGMOBILE Mobile Computing and Communications Review 6(4), 45–55 (2002)CrossRefGoogle Scholar
  28. 28.
    Voida, S., Mynatt, E., MacIntyre, B., Corso, G.: Integrating virtual and physical context to support knowledge workers. IEEE Pervasive Computing 1(3), 73–79 (2002)CrossRefGoogle Scholar
  29. 29.
    Kanter, T.: Attaching Context-Aware Services to Moving Locations. IEEE Internet Computing 7(2), 43–51 (2003)CrossRefGoogle Scholar
  30. 30.
    Chen, G., Kotz, D.: Context-sensitive resource discovery. In: 1st IEEE International Conference on Pervasive Computing and Communications, Texas, USA, pp. 243–252 (2003)Google Scholar
  31. 31.
    Chen, H., Finin, T., Joshi, A., Kagal, L.: Intelligent Agents Meet the Semantic Web in Smart Spaces. IEEE Internet Computing 8(6), 69–79 (2004)CrossRefGoogle Scholar
  32. 32.
    Biegel, G., Cahill, V.: A Framework for Developing Mobile, Context-aware Applications. In: 2nd IEEE Conference on Pervasive Computing and Communications, Orlando, USA, pp. 361–365 (2004)Google Scholar
  33. 33.
    Braun, E., Austaller, G., Kangasharju, J., Muhlhauser, M.: Accessing Web Applications with Multiple Context-Aware Devices. In: Matera, M., Comai, S. (eds.) Engineering Advanced Web Applications, Rinton Press (2004)Google Scholar
  34. 34.
    Fahy, P., Clarke, S.: CASS: Middleware for Mobile Context-Aware Applications. In: ACM MobiSys Workshop on Context Awareness, Boston, USA (2004)Google Scholar
  35. 35.
    Xynogalas, S., Chantzara, M., Sygkouna, I., Vrontis, S., Roussaki, I., Anagnostou, M.: Context Management for the Provision of Adaptive Services to Roaming Users. IEEE Wireless Communications 11(2), 40–47 (2004)CrossRefGoogle Scholar
  36. 36.
    Gu, T., Pung, H.K., Zhang, D.Q.: A Service-Oriented Middleware for Building Context-Aware Services. Journal of Network and Computer Applications 28(1), 1–18 (2005)CrossRefGoogle Scholar
  37. 37.
    Raento, M., Oulasvirta, A., Petit, R., Toivonen, H.: ContextPhone - A prototyping platform for context-aware mobile applications. IEEE Pervasive Computing 4(2), 51–59 (2005)CrossRefGoogle Scholar
  38. 38.
    Pils, C., Strimpakou, M., Roussaki, I., Pfeifer, T.: A context awareness framework for telecommunication environments. eChallenges Conference, Barcelona, Spain (2006)Google Scholar
  39. 39.
    Pils, C., Roussaki, I., Strimpakou, M.: Location-Based Context Retrieval and Filtering. In: Hazas, M., Krumm, J., Strang, T. (eds.) LoCA 2006. LNCS, vol. 3987, pp. 256–273. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  40. 40.
    Zimmer, T.: QoC: Quality of Context – Improving the Performance of Context-Aware Applications. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol. 3968, pp. 209–214. Springer, Heidelberg (2006)Google Scholar
  41. 41.
    Adomavicius, G., Tuzhilin, A.: Toward the Next Generation of Recommender Systems: A Survey of the State-of-the-Art and Possible Extensions. IEEE Transactions on Knowledge and Data Engineering 17(6), 734–749 (2005)CrossRefGoogle Scholar
  42. 42.
    Malone, P., Pfeifer, T.: Cross-domain Context Sensing and Knowledge Sharing Ecosystem. 4th International Workshop on Managing Ubiquitous Communications and Services, Munich, Germany, pp. 165–173 (2007)Google Scholar
  43. 43.
    Pfeifer, T.: Redundant Positioning Architecture. Elsevier Computer Communications 28(13), 1575–1585 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Carsten Pils
    • 1
  • Ioanna Roussaki
    • 2
  • Tom Pfeifer
    • 1
  • Nicolas Liampotis
    • 2
  • Nikos Kalatzis
    • 2
  1. 1.Telecommunications Software and Systems Group, Waterford Institute of Technology, Carriganore, WaterfordIreland
  2. 2.School of Electrical and Computer Engineering, National Technical University of Athens, 9 Heroon Polytechneiou Str, 157-73 Zographou, AthensGreece

Personalised recommendations