메뉴 건너뛰기




Volumn 2, Issue 4, 2006, Pages 427-452

Avoiding privacy violations caused by context-sensitive services

Author keywords

Context awareness; Distributed access control; Location based services

Indexed keywords

ALGORITHMS; CONSTRAINT THEORY; CONTROL SYSTEMS; DECISION THEORY; INFORMATION THEORY;

EID: 33749660336     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2006.07.007     Document Type: Article
Times cited : (13)

References (21)
  • 1
    • 33847011964 scopus 로고    scopus 로고
    • J. Al-Muhtadi, A. Ranganathan, R. Campbell, M.D. Mickunas, Cerberus: A context-aware security scheme for smart spaces, in: Proceedings of IEEE International Conference on Pervasive Computing and Communications, PerCom 2003, 2003, pp. 489-496
  • 2
    • 2642560332 scopus 로고    scopus 로고
    • H. Chen, T. Finin, A. Joshi, Semantic web in the context broker architecture, in: Proceedings of 2nd IEEE International Conference on Pervasive Computing and Communications, PerCom 2004, 2004, pp. 277-286
  • 3
    • 84948995473 scopus 로고    scopus 로고
    • M.J. Covington, P. Fogla, Z. Zhan, M. Ahamad, A context-aware security architecture for emerging applications, in: Proceedings of 18th Annual Computer Security Applications Conference, ACSAC 2002, 2002
  • 4
    • 33749654100 scopus 로고    scopus 로고
    • F. Gandon, N. Sadeh, A semantic Ewallet to reconcile privacy and context awareness, in: Proceedings of 2nd International Semantic Web Conference, ISWC2003, 2003
  • 6
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • Myles G., Friday A., and Davies N. Preserving privacy in environments with location-based applications. Pervasive Computing 2 1 (2003) 56-64
    • (2003) Pervasive Computing , vol.2 , Issue.1 , pp. 56-64
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 7
    • 33750350790 scopus 로고    scopus 로고
    • U. Hengartner, P. Steenkiste, Avoiding privacy violations caused by context-sensitive services, in: Proceedings of 4th IEEE International Conference on Pervasive Computing and Communications, PerCom 2006, 2006, pp. 222-231
  • 8
    • 85084162149 scopus 로고    scopus 로고
    • L. Bauer, M.A. Schneider, E.W. Felten, A general and flexible access-control system for the web, in: Proceedings of 11th Usenix Security Symposium, 2002, pp. 93-108
  • 9
    • 85084100339 scopus 로고    scopus 로고
    • J. Howell, D. Kotz, End-to-end authorization, in: Proceedings of 4th Symposium on Operating System Design & Implementation, OSDI 2000, 2000, pp. 151-164
  • 12
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • Adam N.R., and Wortmann J.C. Security-control methods for statistical databases: A comparative study. ACM Computing Surveys (CSUR) 21 4 (1989) 515-556
    • (1989) ACM Computing Surveys (CSUR) , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 13
    • 33749670943 scopus 로고    scopus 로고
    • U. Hengartner, Access control to information in pervasive computing environments, Ph.D. Thesis, Computer Science Department, Carnegie Mellon University, available as Technical Report CMU-CS-05-160, August 2005
  • 14
    • 33749654097 scopus 로고    scopus 로고
    • C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen, SPKI certificate theory, RFC 2693, September 1999
  • 16
    • 0035791053 scopus 로고    scopus 로고
    • M.J. Covington, W. Long, S. Srinivasan, A. Dey, M. Ahamad, G. Abowd, Securing context-aware applications using environment roles, in: Proceedings of 6th ACM Symposium on Access Control Models and Technologies, SACMAT '01, 2001, pp. 10-20
  • 17
    • 0242625198 scopus 로고    scopus 로고
    • G. Neumann, M. Strembeck, An approach to engineer and enforce context constraints in an RBAC environment, in: Proceedings of 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, 2003, pp. 65-79
  • 20
    • 0242456739 scopus 로고    scopus 로고
    • P. McDaniel, On context in authorization policy, in: Proceedings of 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, 2003, pp. 80-89
  • 21
    • 3543128965 scopus 로고    scopus 로고
    • W.H. Winsborough, N. Li, Safety in automated trust negotiation, in: Proceedings of 2004 IEEE Symposium on Security and Privacy, 2004, pp. 147-160


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.