메뉴 건너뛰기




Volumn , Issue , 2007, Pages 26-

Architecting pervasive computing systems for privacy: A survey

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; KNOWLEDGE MANAGEMENT; SOFTWARE ARCHITECTURE; TAXONOMIES; UBIQUITOUS COMPUTING;

EID: 34547176295     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WICSA.2007.11     Document Type: Conference Paper
Times cited : (18)

References (29)
  • 2
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46-55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-90, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 11
    • 24944432404 scopus 로고    scopus 로고
    • A formal model of obfuscation and negotiation for location privacy
    • M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Proceedings of PERVASIVE 2005, pages 152-170, 2005.
    • (2005) Proceedings of PERVASIVE 2005 , pp. 152-170
    • Duckham, M.1    Kulik, L.2
  • 12
    • 0038349207 scopus 로고    scopus 로고
    • Tarzan: A peer-to-peer anonymizing network layer
    • M. J. Freedman and R. Morris. Tarzan: a peer-to-peer anonymizing network layer. In Proceedings of ACM CCS '02, pages 193-206, 2002.
    • (2002) Proceedings of ACM CCS '02 , pp. 193-206
    • Freedman, M.J.1    Morris, R.2
  • 13
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM MobiSys2003, pages 31-42, 2003.
    • (2003) ACM MobiSys2003 , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2
  • 14
    • 4544259863 scopus 로고    scopus 로고
    • An architecture for privacy-sensitive ubiquitous computing
    • J. I. Hong and J. A. Landay. An architecture for privacy-sensitive ubiquitous computing. In ACM MobiSys '04, pages 177-189, 2004.
    • (2004) ACM MobiSys '04 , pp. 177-189
    • Hong, J.I.1    Landay, J.A.2
  • 15
    • 0030386375 scopus 로고    scopus 로고
    • Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems
    • S. E. Hudson and I. Smith. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In Proceedings of ACM CSCW '96, pages 248-257, 1996.
    • (1996) Proceedings of ACM CSCW '96 , pp. 248-257
    • Hudson, S.E.1    Smith, I.2
  • 16
    • 33745725717 scopus 로고    scopus 로고
    • An anonymous communication technique using dummies for location-based services
    • H. Kido, Y. Yanagisawa, and T. Satoh. An anonymous communication technique using dummies for location-based services. In Proceedings of the IEEE ICPS'05, pages 88-97, 2005.
    • (2005) Proceedings of the IEEE ICPS'05 , pp. 88-97
    • Kido, H.1    Yanagisawa, Y.2    Satoh, T.3
  • 17
    • 35248863455 scopus 로고    scopus 로고
    • Towards meeting the privacy challenge: Adapting DRM
    • L. Korba and S. Kenny. Towards meeting the privacy challenge: Adapting DRM. In ACM CCS-9 Workshop, pages 118-136, 2003.
    • (2003) ACM CCS-9 Workshop , pp. 118-136
    • Korba, L.1    Kenny, S.2
  • 18
    • 34547140442 scopus 로고    scopus 로고
    • S. Lahlou and F. Jegou. European disappearing computer privacy design guidelines v 1.1. Technical Report EDC-2003, Ambient Agoras, 2004.
    • S. Lahlou and F. Jegou. European disappearing computer privacy design guidelines v 1.1. Technical Report EDC-PG 2003, Ambient Agoras, 2004.
  • 19
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B.W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 20
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by design - principles of privacy-aware ubiquitous systems
    • M. Langheinrich. Privacy by design - principles of privacy-aware ubiquitous systems. In UbiComp2001, pages 273-291, 2001.
    • (2001) UbiComp2001 , pp. 273-291
    • Langheinrich, M.1
  • 21
    • 84937411601 scopus 로고    scopus 로고
    • A privacy awareness system for ubiquitous computing environments
    • M. Langheinrich. A privacy awareness system for ubiquitous computing environments. In UbiComp 2002, pages 237-245, 2002.
    • (2002) UbiComp 2002 , pp. 237-245
    • Langheinrich, M.1
  • 22
    • 0142156637 scopus 로고    scopus 로고
    • The design of a context-aware home media space for balancing privacy and awareness
    • C. Neustaedter and S. Greenberg. The design of a context-aware home media space for balancing privacy and awareness. In UbiComp 2003, pages 297-314, 2003.
    • (2003) UbiComp 2003 , pp. 297-314
    • Neustaedter, C.1    Greenberg, S.2
  • 24
    • 33751033073 scopus 로고    scopus 로고
    • Efficient context-aware service discovery in multi-protocol pervasive environments
    • IEEE Computer Society, May
    • P.-G. Raverdy, O. Riva, A. de La Chapelle, R. Chibout, and V. Issarny. Efficient context-aware service discovery in multi-protocol pervasive environments. In Proceedings of MDM'06, page 3. IEEE Computer Society, May 2006.
    • (2006) Proceedings of MDM'06 , pp. 3
    • Raverdy, P.-G.1    Riva, O.2    de La Chapelle, A.3    Chibout, R.4    Issarny, V.5
  • 25
    • 0002265410 scopus 로고    scopus 로고
    • The platform for privacy preferences
    • J. Reagle and L. F. Cranor. The platform for privacy preferences. Commununications of the ACM, 42(2):48-55, 1999.
    • (1999) Commununications of the ACM , vol.42 , Issue.2 , pp. 48-55
    • Reagle, J.1    Cranor, L.F.2
  • 27
    • 84946833891 scopus 로고    scopus 로고
    • R. L. Rivest, A. S., and Y Tauman. How to leak a secret. In Proceedings of ASIACRYPT '01, pages 552-565, 2001.
    • R. L. Rivest, A. S., and Y Tauman. How to leak a secret. In Proceedings of ASIACRYPT '01, pages 552-565, 2001.
  • 29
    • 0032264597 scopus 로고    scopus 로고
    • Evaluating image filtering based techniques in media space applications
    • Q. A. Zhao and J. T. Stasko. Evaluating image filtering based techniques in media space applications. In Proceedings of ACM CSCW '98, pages 11-18, 1998.
    • (1998) Proceedings of ACM CSCW '98 , pp. 11-18
    • Zhao, Q.A.1    Stasko, J.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.