, CO2 is too high ! ")

, // send a notification 12 notificationService.sendNotification

, 15 for(DoorLock doorLock : doorLocks) {

/. Lock, DoorLock 17 conflictManager.lockService(services.get(doorLock))

, 19 } 20 if (state == true) { 21 for(BinaryLight binaryLight : binaryLights) {

G. D. Abowd, Towards a Better Understanding of Context and Context-Awareness, Handheld and Ubiquitous Computing, First International Symposium, HUC'99, p.304307, 1999.

L. Atzori, A. Iera, and G. Morabito, The Internet of Things: A survey, Computer Networks, vol.54, p.27872805, 2010.

F. K. Aldrich, Smart Homes: Past, Present and Future. In: Inside the Smart Home, pp.978-979, 2003.

. Osgi-alliance and . Osgi,

C. Aygalinc, A model-based approach to context management in pervasive platforms, Pervasive Computing and Communication Workshops (PerCom Workshops), p.16, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01370467

G. Banavar, Challenges: an application model for pervasive computing, MOBICOM 2000, Proceedings of the sixth annual international conference on Mobile computing and networking, p.266274, 2000.

J. Bardin, RoSe : un framework pour la conception et l'exécution d'applications distribuées dynamiques et hétérogènes. (RoSe : A framework for the design and execution of dynamic and heterogeneous distributed applications), 2012.

J. Peter, J. D. Brown, X. Bovey, and . Chen, Context-aware applications: from the laboratory to the marketplace, IEEE Personal Commun. 4, vol.5, p.5864, 1997.

M. A. Benatia, A. Baudry, . Louis, and C. Livrable,

E. Balland and C. Consel, Programming Support Innovations for Emerging Distributed Applications, p.3, 2010.

M. Baldauf, S. Dustdar, and F. Rosenberg, A survey on context-aware systems, p.263277, 2007.

C. Becker, BASE-A Micro-Broker-Based Middleware for Pervasive Computing, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), p.443451, 2003.

C. Becker, PCOM-A Component System for Pervasive Computing, Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications, p.6776, 2004.

B. Bertran, A tool suite to develop Sense/Compute/Control applications, In: Sci. Comput. Program, vol.79, p.3951, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00702909

C. Bettini, A survey of context modelling and reasoning techniques, Pervasive and Mobile Computing, vol.6, p.161180, 2010.

;. Kenneth-j-biba and . Ma, Integrity considerations for secure computer systems, 1977.

J. Bruneau, W. Jouve, and C. Consel, DiaSim: A parameterized simulator for pervasive computing applications, 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, p.110, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00403421

E. Bell and L. Ma, Secure computer systems: Mathematical foundations, 1973.

L. G. Bouma and H. Velthuijsen, Feature interactions in telecommunications systems, 1994.

A. Cancellieri, L'habitat du futur: dés et prospective pour le prochain quart de siècle. Documentation française, 1992.

D. Cassou, A generative programming approach to developing pervasive computing systems, ACM Sigplan Notices, vol.45, issue.2, p.137146, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00405819

D. Cassou, Développement logiciel orienté paradigme de conception: la programmation dirigée par la spécication, 2011.

H. Cervantes, Vers un modèle à composants orienté services pour supporter la disponibilité dynamique, 2004.

B. Councill and . George-t-heineman, Denition of a software component and its elements, Component-based software engineering: putting the pieces together, p.519, 2001.

H. Cervantes and R. Hall, Autonomous adaptation to dynamic availability using a service-oriented component model, Proceedings of the 26th International Conference on Software Engineering, p.614623, 2004.

M. Chan, A review of smart homesPresent state and future challenges, Computer methods and programs in biomedicine, vol.91, p.5581, 2008.

G. Chen and D. Kotz, A Survey of Context-Aware Mobile Computing Research, 2000.

M. Calder and E. Magill, Feature Interactions in Telecommunications and software systems VI, 2000.

A. Colin, Autonomic service-oriented context for pervasive applications, Services Computing (SCC), p.491498, 2016.
DOI : 10.1109/scc.2016.70

J. Cameron and H. Velthuijsen, Feature interactions in telecommunications systems, IEEE Communications Magazine, vol.31, pp.18-23, 1993.
DOI : 10.1109/35.229532

D. E. Denning, A lattice model of secure information ow, Communications of the ACM 19, vol.5, p.236243, 1976.
DOI : 10.1145/360051.360056

C. Escoer, S. Chollet, and P. Lalanda, Lessons learned in building pervasive platforms, 11th IEEE Consumer Communications and Networking Conference, p.712, 1013.

W. Edwards and R. Grinter, At home with ubiquitous computing: Seven challenges, Ubicomp 2001: Ubiquitous Computing, p.256272, 2001.
DOI : 10.1007/3-540-45427-6_22

URL : http://www.cc.gatech.edu/~keith/classes/ubicomplexity/pdfs/crit/edwards-home.pdf

W. Enck, M. Ongtang, and P. Mcdaniel, Understanding android security, IEEE security & privacy, vol.7, p.5057, 2009.

C. Escoer, iPOJO : Un modèle à composant à service exible pour les systèmes dynamiques. (iPOJO : A exible service-oriented component model for dynamic systems), 2008.

P. Kapali and . Eswaran, The notions of consistency and predicate locks in a database system, Communications of the ACM, vol.19, pp.624-633, 1976.

A. Faravelon, Une démarche de conception et d'implémentation de la protection de la vie privée basée sur le contrôle d'accès appliquée aux compositions de services, 2013.

. David-f-ferraiolo, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security (TISSEC), vol.4, p.224274, 2001.

. David-f-ferraiolo, The role control center: features and case studies, Proceedings of the eighth ACM symposium on Access control models and technologies, p.1220, 2003.

M. Fowler, POJO : An acronym for: Plain Old Java Object, 2000.

. Gaia, Gaia web site

M. Gallissot, Modéliser le concept de confort dans un habitat intelligent: du multisensoriel au comportement, 2012.

G. Gardarin, Bases de données. Editions Eyrolles, 2003.

I. N. Garcia, Modèles de conception et d'exécution pour la médiation et l'intégration de services. (Conception and execution models to mediate and integrate service), 2012.

R. Grimm and B. N. Bershad, System Support for Pervasive Applications, Future Directions in Distributed Computing, Research and Position Papers, p.212217, 2003.
DOI : 10.1007/3-540-37795-6_42

URL : https://digital.lib.washington.edu:443/researchworks/bitstream/1773/6972/1/3072090.pdf

A. Greeneld, Everyware: The dawning age of ubiquitous computing. New Riders, 2010.

, Object Management Group. CORBA 3.1, 2008.

B. Ganter and R. Wille, Formal concept analysis: mathematical foundations, Springer Science & Business Media, 2012.

R. Hall, OSGi in action: Creating modular applications in Java, 2011.

U. Hansmann, Pervasive computing: The mobile world, 2003.

K. Henricksen, A framework for context-aware pervasive computing applications, 2003.

M. Hawley, R. Dunbar-poor, and M. Tuteja, Things that think, Personal Technologies, vol.1, pp.1617-4917, 1997.

. Michael-a-harrison, . Walter-l-ruzzo, and . Ullman, Protection in operating systems, Communications of the ACM, vol.19, pp.461-471, 1976.

I. Self-star-website,

J. Henner, Towards securing pervasive computing systems by design: a language approach, 2011.

H. Jakob, C. Consel, and N. Loriant, Architecturing Conict Handling of Pervasive Computing Resources, In: DAIS, vol.11, p.92105, 2011.

A. Dominguez, Detection of feature interactions in automotive active safety features, 2012.

F. Jeuland, , 2005.

M. Korkea-aho, Context-aware applications survey, 2000.

M. Kohler, C. Liesegang, and A. Schaad, Classication model for access control constraints, Performance, Computing, and Communications Conference, p.410417, 2007.

M. Kolberg, H. Evan, M. Magill, and . Wilson, Compatibility issues between services supporting networked appliances, IEEE Communications Magazine, vol.41, p.136147, 2003.

S. Krakowiak, Middleware Architecture with Patterns and Frameworks, 2007.

K. Kimbler and H. Velthuijsen, Feature interaction benchmark, Third Feature Interaction Workshop (FIW'95), 1995.

P. Lalanda, Smart home systems, Smart Home Systems, 2010.

P. Lalanda, Service-based architecture and frameworks for pervasive health applications, 20th IEEE Conference on Emerging Technologies & Factory Automation, ETFA 2015, p.18, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01196881

. Butler-w-lampson, Protection. In: ACM SIGOPS Operating Systems Review, vol.8, issue.1, p.1824, 1974.

N. Li, Discretionary access control, Encyclopedia of Cryptography and Security, p.353356, 2011.

F. Mattern, The Vision and Technical Foundations of Ubiquitous Computing, Journal article, p.26, 2001.

F. Mattern, Ubiquitous Computing: Scenarios from an informatised world, E-Merging Media-Communication and the Media Economy of the Future, p.145163, 2005.

S. Micera, P. Bonato, T. Tamura, and . Gerontechnology, IEEE Engineering in Medicine and Biology Magazine, vol.27, p.1014, 2008.

D. Moreno-garcia, Modèles, outils et plate-forme d'exécution pour les applications à service dynamiques, 2013.

S. Munir, . John, and . Stankovic, DepSys: Dependency aware integration of cyber-physical systems for smart homes, Cyber-Physical Systems (ICCPS), p.127138, 2014.
DOI : 10.1109/iccps.2014.6843717

URL : http://www.cs.virginia.edu/~stankovic/psfiles/ICCPS_14_5-1.pdf

N. Medvidovic and R. N. Taylor, Software architecture: foundations, theory, and practice, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, vol.2, p.471472, 2010.

M. Nakamura, H. Igaki, and K. Matsumoto, Feature interactions in integrated services of networked home appliances, Proc. of Int'l. Conf. on Feature Interactions in Telecommunication Networks and Distributed Systems (ICFI'05, p.236251, 2005.
DOI : 10.1145/1035167.1035206

URL : http://library.naist.jp/dspace/bitstream/10061/12720/1/132_ICSOC2004.pdf

M. P. Papazoglou, Service-Oriented Computing: Concepts, Characteristics and Directions, p.312, 2003.
DOI : 10.1109/wise.2003.1254461

I. Park, A dynamic context conict resolution scheme for groupaware ubiquitous computing environments, Proceedings of the 1st International Workshop on Personalized Context Modeling and Management for UbiComp Applications, p.4247, 2005.

M. Plath and . Mark-dermot-ryan, Plug-and-play Features, p.150164, 1998.

A. Ranganathan, 3rd IEEE International Conference on Pervasive Computing and Communications, p.716, 2005.

A. Ranganathan, H. Roy, and . Campbell, An infrastructure for contextawareness based on rst order logic, Personal and Ubiquitous Computing, vol.7, p.353364, 2003.
DOI : 10.1007/s00779-003-0251-x

. Manuel-román, A Middleware Infrastructure for Active Spaces, IEEE Pervasive Computing, vol.1, p.7483, 2002.

. Manuel-román, Gaia: a middleware platform for active spaces, Mobile Computing and Communications Review, vol.6, p.6567, 2002.

. Rim-romdhane, Automatic video monitoring system for assessment of

, Alzheimer's disease symptoms, The journal of nutrition, vol.16, p.213218, 2012.

D. Ronzani, The battle of concepts: Ubiquitous Computing, pervasive computing and ambient intelligence in Mass Media, In: Ubiquitous Computing and Communication Journal, vol.4, p.919, 2009.

M. Satyanarayanan, Pervasive computing: vision and challenges, IEEE Personal Commun, vol.8, p.1017, 2001.
DOI : 10.1109/98.943998

B. N. Schilit, N. Adams, and R. Want, Context-Aware Computing Applications, First Workshop on Mobile Computing Systems and Applications, WMCSA, p.8590, 1994.

. Stephen-r-schach, Object-oriented and classical software engineering, 2011.

R. Sandhu, D. Ferraiolo, and R. Kuhn, American National Standard for Information TechnologyRole based Access Control, ANSI INCITS, vol.359, p.149, 2004.

C. A. Szyperski, D. Gruntz, and S. Murer, Component software-beyond object-oriented programming, 2002.

S. Ravi, P. Sandhu, and . Samarati, Access control: principle and practice, IEEE communications magazine, vol.32, p.4048, 1994.

N. Bill, M. Schilit, and . Theimer, Disseminating active map information to mobile hosts, IEEE network, vol.8, p.2232, 1994.

P. Samarati and S. Vimercati, Access control: Policies, models, and mechanisms, International School on Foundations of Security Analysis and Design, p.137196, 2000.

A. David and . Taylor, Object technology: a manager's guide, 1997.

V. Tuttlies, G. Schiele, and C. Becker, Comity-conict avoidance in pervasive computing environments, On the move to meaningful internet systems 2007: OTM 2007 workshops, pp.763-772, 2007.

S. Vansyckel, G. Schiele, and C. Becker, Extending context management for proactive adaptation in pervasive environments, Ubiquitous Information Technologies and Applications, p.823831, 2013.

J. Waldner, Nano-informatique et intelligence ambiante: inventer l'ordinateur du XXIe siècle. Hermès Science, 2007.

R. Want, The Active Badge Location System, In: ACM Trans. Inf. Syst, vol.10, p.91102, 1992.
URL : https://hal.archives-ouvertes.fr/hal-00699850

M. Weiser and J. Seely-brown, Designing calm technology, PowerGrid Journal, vol.1, issue.1, p.7585, 1996.

M. Weiser, The computer for the 21st century, Scientic american, vol.265, p.94104, 1991.

M. Yagita, F. Ishikawa, and S. Honiden, An application conict detection and resolution system for smart homes, Proceedings of the First International Workshop on Software Engineering for Smart Cyber-Physical Systems, p.3339, 2015.

E. Yuan and J. Tong, Attributed based access control (ABAC) for web services, Web Services, 2005. ICWS 2005. Proceedings. 2005 IEEE International Conference on. IEEE, 2005.