J. Rao, E. Chan, L. Van, H. Yamamoto, K. Takizawa et al., The US Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon

B. Schilit, N. Adams, and R. Want, A System Architecture for Context-Aware Mobile Computing Context-Aware Computing Applications, Proc. of the Workshop on Mobile Computing Systems and Applications, pp.85-90, 1994.

M. Dertouzos, D. Garlan, D. Siewiorek, A. Smailagic, P. Steenkiste et al., The Future of Computing Project Aura: Towards Distraction-Free Pervasive Computing, Personal and Ubiquitous Computing, Special Issue Situated Interaction and Context-Aware Computing, pp.22-31, 1999.

J. Hong, A. K. Dey, G. D. Abowd, A. Dey, D. Salber et al., Toward a Better Understanding of Context and Context- Awareness, GVU Technical Report GIT-GVU-99-22 An Architecture to Support Context Aware Computing College Computing, Georgia Institute of Technology W3C: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, Recommendation 16 Technology Reports http://xml.coverpages.org/saml.html [14] OASIS: Extensible Access Control Markup Language (XACML) Technology Reports The Enterprise Privacy Authorization Language (EPAL 1.1) The Semantic Web, www.w3.org/TR/P3P/ [13] OASIS: Security Assertion Markup Language (SAML)) [17] Hendler, J.: Agents on the Web) [18] DAML Joint Committee: DAML+OIL languagew3.org/TR/owl-ref/ [20] DAML Services Coalition: DAML-S: Web Service Description for the Semantic Web, First International Semantic Web Conference, ISWC'02 OWL-S: Semantic Markup for Web Services Privacy in Pervasive Environments: Next Generation Labeling Protocols " . Pervasive and Ubiquitous Computing, pp.30-37, 1999.

]. U. Hengartner, P. , and S. , Implementing access control to people location information, Proceedings of the ninth ACM symposium on Access control models and technologies , SACMAT '04, 2004.
DOI : 10.1145/990036.990039

]. L. Kagal, T. Finin, and A. Joshi, A policy language for a pervasive computing environment, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003.
DOI : 10.1109/POLICY.2003.1206958

S. Lederer, J. I. Hong, X. Jiang, A. K. Dey, J. A. Landay et al., A privacy awareness system for ubiquitous computing environments Towards everyday privacy for ubiquitous computing, Proceedings of Ubicomp 2002, pp.237-245, 2002.

M. Norman, T. Sadeh, L. Chan, O. Van, K. Kwon et al., Creating an Open Agent Environment for Context-aware M-CommerceAgentcities: Challenges in Open Agent Environments Semantic Web Technologies to Reconcile Privacy and Context AwarenessHot Spots, Feng and N. Sadeh, Context-Aware Computing Using a Shared Contextual Information Service, pp.152-158, 2003.

S. M. Fipa, N. Sheshagiri, F. Sadeh, and . Gandon, Using Semantic Web Services for Context- Aware Mobile Applications, MobiSys 2004 Workshop on Context Awareness, 2002.

]. Chou, W. Hsieh, F. Gandon, and N. Sadeh, Semantic Web Technologies for Context-Aware Museum Tour Guide Applications [34] F. Gandon, and N. Sadeh. A semantic e-wallet to reconcile privacy and context awareness, Mobile Information Systems (WAMIS'05) Proceedings of the Second International Semantic Web Conference (ISWC03), 2003.

]. F. Gandon, N. Sadeh-friedman-hill, and E. , ROWL: Rule language in OWL and translation engine for JESS http://mycampus.sadehlab.cs.cmu Jess in Action: Java Rule-based Systems, 2003.

J. Bellifemine, F. Caire, G. Poggi, A. Rimassa, and G. , W3C: XSL Transformations (XSLT) Version 1.0, Recommendation 16 JADE : A While Paper, EXP magazine, Telecom Italia, 1993.

D. W. David-leake-aha, D. Kibler, and M. K. Albert, Case-based reasoning ? Experiences, lessons and future directions Instance-based Learning Algorithms, Machine Learning, pp.37-66, 1991.

N. Cercone, A. An, and C. C. , Rule-induction and case-based reasoning: hybrid architectures appear advantageous, IEEE Transactions on Knowledge and Data Engineering, vol.11, issue.1, pp.166-174, 1999.
DOI : 10.1109/69.755625