ResPubID14741. ubiquitous computing, access management, usage access control, access control management, data protection, usage control models, pervasive computing