J. Al-Muhtadi, A. Ranganathan, R. Campbell and M.D. Mickunas, Cerberus: a context-aware security scheme for smart spaces, in: Pervasive Computing and Communications, (PerCom 2003), Proceedings of the 1st IEEE International Conference, 23–26 March 2003, pp. 489–496.Google Scholar
A. N. Belbachir, M. Litzenberger, S. Schraml, M. Hofstatter, D. Bauer, P. Schon, M. Humenberger, C. Sulzbachner, T. Lunden and M. Merne, CARE: a dynamic stereo vision sensor system for fall detection, in: 2012 IEEE International Symposium on Circuits and Systems (ISCAS), 20–23 May 2012, pp. 731–734.Google Scholar
T. Berners-Lee, R. Fielding and L. Masinter, RFC 3986 – Uniform Resource Identifier (URI): Generic Syntax, 2005, http://tools.ietf.org/html/rfc3986, Accessed 15 April, 2014.
B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu and B. Thuraisingham, A semantic web based framework for social network access control, in: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pp. 177–186, 2009.Google Scholar
B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu and B. Thuraisingham, Semantic Web-based social network access control, Comput. Security 30 (2011), 108–115.CrossrefWeb of ScienceGoogle Scholar
J. L. Carús, S. García, R. García, J. Waterworth and S. Erdt, The ELF@Home project: elderly sELF-care based on sELF-check of health conditions and sELF-fitness at home, Studies Health Technol. Inform. 200 (2014), 164–166.Google Scholar
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley and W. Polk, RFC 5280: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, http://tools.ietf.org/html/rfc5280, Accessed 15 April, 2014.
A. K. Dey, D. Salber and G. D. Abowd, A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications, Context-Aware Computing, A Special Triple Issue of Human-Computer Interaction, Lawrence-Erlbaum, 2001, http://www.cc.gatech.edu/fce/ctk/pubs/HCIJ16.pdf, Accessed 15 April, 2014.
C. Granata, P. Bidaud, C. Beck and P. Mayer, Experimental analysis of interactive behaviors for a personal mobile robot, in: Proceedings of the Fifteenth International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, Baltimore, MD, USA, 23–26 July 2012.Google Scholar
Z. He, L. Wu, H. Li, H. Lai and Z. Hong, Semantics-based access control approach for web service, J. Comput. 6 (2011), 1152–1161.Google Scholar
J. Honkola, H. Laine, R. Brown and O. Tyrkko, Smart-M3 information sharing platform, in: Proceedings of IEEE Symposium on Computers and Communications (ISCC’10), IEEE Comp. Soc., June 2010, pp. 1041–1046.Google Scholar
B. Johanson, A. Fox, P. Hanrahan and T. Winograd, The event heap: an enabling infrastructure for interactive workspaces, in: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications, 2001.Google Scholar
A. S. M. Kayes, J. Han and A. Colman, An ontology-based approach to context-aware access control for software services, Web Information Systems Engineering – WISE 2013, Lecture Notes in Computer Science, vol. 8180, pp. 410–420, 2013.Google Scholar
P. Liuha, A. Lappeteläine and J.-P. Soininen, Smart objects for intelligent applications, ARTEMIS Mag. 5 (2009), 27–29.Google Scholar
A. Mohammad, G. Kanaan, T. Khdour and S. Bani-Ahmad, Ontology-based access control model for semantic web service, J. Inform. Comput. Sci. 6 (2011), 177–194.Google Scholar
F. Nikayin and M. de Reuver, Governance of smart living service platforms: state-of-the-art and the need for collective action, in: Third International Engineering Systems Symposium CESUN, CESUN 2012, Delft University of Technology, 18–20 June 2012.Google Scholar
J. Rafferty, L. Chen and C. Nugent, Ontological goal modelling for proactive assistive living in smart environments, Ubiquitous Computing and Ambient Intelligence. Context-Awareness and Context-Driven Interaction, Lecture Notes in Computer Science, vol. 8276, pp. 262–269, 2013.Google Scholar
C. Röcker, Smart medical services: a discussion of state-of-the-art approaches, in: Proceedings of the International IEEE Conference on Machine Learning and Computing (ICMLC’11), vol. 1, S. Thatcher, ed., February 26–28, 2011, Singapore, pp. 334–338.Google Scholar
A. Toninelli, R. Montanari, L. Kagal and O. Lassila, A semantic context-aware access control framework for secure collaborations in pervasive computing environments, in: Proceeding ISWC’06 Proceedings of the 5th international Conference on the Semantic Web, Springer-Verlag, Berlin, pp. 473–486, 2006.Google Scholar
C. Tsiourti, E. Joly, C. Wings, M. Ben Moussa and K. Wac, Virtual assistive companion for older adults: field study and design implications, in: 8th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth), 2014.Google Scholar
S. Verma, M. Singh and S. Kumar, Comparative analysis of role base and attribute base access control model in semantic web, Int. J. Comput. Appl. 46 (2012), 1–6.Google Scholar
J. A. Waterworth, S. Ballesteros and C. Peter, User-sensitive home-based systems for successful ageing, Proceedings of HSI 2009 – 2nd International Conference on Human System Interaction, Catania, Italy, May 2009.Google Scholar
W. Xie, Y. Shi, G. Xu and Y. Mao, Smart platform – a software infrastructure for smart space (SISS), in: Proceedings of the Fourth IEEE International Conference on Multimodal Interfaces, pp. 429–434, 2002.Google Scholar