Inscribing Interpretive Flexibility of Context Data in Ubiquitous Computing Environments: An Action Research Study of Vertical Standard Development

Inscribing Interpretive Flexibility of Context Data in Ubiquitous Computing Environments: An Action Research Study of Vertical Standard Development

Magnus Andersson, Rikard Lindgren
ISBN13: 9781605669601|ISBN10: 1605669601|EISBN13: 9781605669618
DOI: 10.4018/978-1-60566-960-1.ch067
Cite Chapter Cite Chapter

MLA

Andersson, Magnus, and Rikard Lindgren. "Inscribing Interpretive Flexibility of Context Data in Ubiquitous Computing Environments: An Action Research Study of Vertical Standard Development." Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications, edited by Judith Symonds, IGI Global, 2010, pp. 1079-1097. https://doi.org/10.4018/978-1-60566-960-1.ch067

APA

Andersson, M. & Lindgren, R. (2010). Inscribing Interpretive Flexibility of Context Data in Ubiquitous Computing Environments: An Action Research Study of Vertical Standard Development. In J. Symonds (Ed.), Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications (pp. 1079-1097). IGI Global. https://doi.org/10.4018/978-1-60566-960-1.ch067

Chicago

Andersson, Magnus, and Rikard Lindgren. "Inscribing Interpretive Flexibility of Context Data in Ubiquitous Computing Environments: An Action Research Study of Vertical Standard Development." In Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications, edited by Judith Symonds, 1079-1097. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-60566-960-1.ch067

Export Reference

Mendeley
Favorite

Abstract

Ubiquitous access and pervasive computing concept is almost intrinsically tied to wireless communications. Emerging next-generation wireless networks enable innovative service access in every situation. Apart from many remote services, proximity services will also be widely available. People currently rely on numerous forms of identities to access these services. The inconvenience of possessing and using these identities creates significant security vulnerability, especially from network and device point of view in wireless service access. After explaining the current identity solutions scenarios, the chapter illustrates the on-going efforts by various organizations, the requirements and frameworks to develop an innovative, easy-to-use identity management mechanism to access the future diverse service worlds. The chapter also conveys various possibilities, challenges, and research questions evolving in these areas.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.