
 
Patterns capture design knowledge, such as 
guidelines and heuristics, in three ways.  
First, patterns offer low-level solutions to 
specific problems rather than providing high-level 
and abstract suggestions. Second, patterns are 
generative, helping designers create new solutions 
by showing many examples of actual designs. Third, 
patterns are linked to one another hierarchically 
(structured), helping designers address high-level 
problems as well as low-level ones. Patterns are 
intended to complement guidelines and heuristics. 
Patterns are simply another tool for helping 
designers create high-quality solutions. 
6  CONCLUSIONS 
In this article, we define clear boundaries for PEISs 
and we highlight the importance of ensuring 
accessibility, security and interoperability by 
applying an adaptive service oriented security policy 
such as: RBAC. We show the challenges that face 
the integration of different system sub components 
and we stress on the importance of providing a 
system that satisfies the user needs, simplifies his 
interaction with highly advanced devices in highly 
dynamic environments.  
REFERENCES 
Al Kukhun, D. and Sedes, F., 2006. “Towards a pervasive 
computing benchmark”. In MAPS 06, Multimodal and 
Pervasive Services Workshop, ICPS406, IEEE 
Conference on Pervasive Services, IEEE, pp. 29-34. 
Almenárez, F., Marín, A., Campo, C. and García, C., 
2005. “TrustAC: Trust-Based Access Control for 
Pervasive Devices”. In The 2nd International 
Conference on Security in Pervasive Computing, 
Boppard, Germany, pp 225-238. 
Campbel, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G. 
and Mickunas, M. D. 2002. “Towards Security and 
Privacy for Pervasive Computing”. In Proceedings of 
International Symposium on Software Security, pp. 1-
15. 
Chen, E., Zhang, D., Shi, Y. and Xu G., 2004. “Seamless 
Mobile Service for Pervasive Multimedia”. In 
PCM’05, 5th Pacific Rim Conference on Multimedia, 
IEEE, pp.194-198. 
Chung, E. S., Hong, J. I., Lin, J., Prabaker, M. K., Landay, 
J. A. and Liu, A. L., 2004. “Development and 
evaluation of emerging design patterns for ubiquitous 
computing”. In 2004 conference on Designing 
interactive systems: processes, practices, methods, 
and techniques, Cambridge, MA, USA, pp. 233 - 242. 
Davis, J., Tierney, A., Chang, E., 2005. “A User-
Adaptable User Interface Model to Support 
Ubiquitous User Access to EIS Style Applications”. In 
COMPSAC’05, The 29th Annual International 
Computer Software and Applications Conference, 
IEEE, pp. 351 – 358. 
Duan, Y. and Canny, J., 2004. “Protecting User Data in 
Ubiquitous Computing: Towards trustworthy 
environments”. In PET’04, Privacy Enhancing 
Technologies, Springer, pp. 167-185. 
Graham, L., 1999. The principles of Interactive design. In 
Delmar Publishing. 
Gschwind, T., Jazayeri, M. and Oberleitner, J., 2002. 
“Pervasive Challenges for Software Components”. In 
RISSE’02, 9th International Workshop on Radical 
Innovations of Software and Systems Engineering in 
the Future, Springer, pp. 152-166. 
Munoz, J. and Pelechano V., 2005. “Building a Software 
Factory for Pervasive Systems Development”. In 
Advanced Information Systems Engineering, Springer 
Berlin / Heidelberg, pp. pp 342-356. 
Niemela, E., Latvakoski, J., 2004. “Survey of 
Requirements and Solutions for Ubiquitous Software”. 
In  The 3
rd
 International Conference on Mobile and 
Ubiquitous Multimedia, College Park, Maryland, pp 
71 – 78. 
OASIS, 2003. “A brief Introduction to XACML”. In 
http://www.oasis-open.org/committees/download.php 
/2713/Brief_Introduction_to_XACML.html  , consulted 
on april 2007. 
OASIS, 2004. “Universal Business Language 1.0”. In 
http://docs.oasis-open.org/ubl/cd-UBL-1.0  , consulted 
on april 2007. 
Park, I., Kim, W. and Park, Y., 2004. “A Ubiquitous 
Streaming Framework for Multimedia Broadcasting 
Service with QoS based mobility Support”. In 
Information Networking, LNCS 3090 in Springer-
Verlag (SCI-E), pp.65-74. 
Ranganathan, A., Al-Muhtadi, J., Biehl, J., Ziebart, B. 
Campbell, R.H. and Bailey, B., 2005. “Towards a 
pervasive computing benchmark”. In PerCom 2005, 
Third IEEE International Conference on Pervasive 
Computing and Communications, IEEE, pp.194-198. 
Want, R., Pering, T., Borriello, G. and Farkas, K. 2002 
“Disappearing hardware”. In Pervasive Computing, 
IEEE, Vol 1,  Issue 1, pp. 36 – 47. 
Weiser, M., 1999. “The computer for the 21st century”, In 
ACM SIGMOBILE Mobile Computing and 
Communications Review, vol 3, ACM, pp. 3 - 11. 
Yang, H., Jansen, E. and Helal, S., 2006. “A Comparison 
of Two Programming Models for Pervasive 
Computing”. In SAINT Workshops 2006, International 
Symposium on Applications and the Internet, IEEE, 
pp134 – 137. 
Zimmermann, A., Lorenz, A. and Specht, M., 2005. 
“Applications of a Context-Management System”, In  
Modeling and Using Context, Springer Berlin/ 
Heidelberg, pp 556-569. 
ICEIS 2007 - International Conference on Enterprise Information Systems
242