메뉴 건너뛰기




Volumn 6, Issue 4, 2007, Pages 48-55

Physical access control for captured RFID data

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNITY-ORIENTED PERVASIVE COMPUTING; DATA USERS; RADIO FREQUENCY IDENTIFICATION TECHNOLOGY (RFID);

EID: 35348826790     PISSN: 15361268     EISSN: None     Source Type: Journal    
DOI: 10.1109/MPRV.2007.81     Document Type: Article
Times cited : (48)

References (22)
  • 1
    • 33750083406 scopus 로고    scopus 로고
    • Reminding ABOUT Tagged Objects Using Passive RFIDs
    • Proc. Ubiquitous Computing 6th Int'l Conf, Ubicomp 04, Springer
    • G. Borriello et al., "Reminding ABOUT Tagged Objects Using Passive RFIDs," Proc. Ubiquitous Computing 6th Int'l Conf. (Ubicomp 04), LNCS 3205, Springer, 2004, pp. 36-53.
    • (2004) LNCS , vol.3205 , pp. 36-53
    • Borriello, G.1
  • 2
    • 33845303529 scopus 로고    scopus 로고
    • Fine-Grained Activity Recognition by Aggregating
    • Abstract Object Usage, IEEE CS Press
    • D. Patterson et al., "Fine-Grained Activity Recognition by Aggregating Abstract Object Usage," Proc. 9th Int'l Symp. Wearable Computers (ISWC 05), IEEE CS Press, 2005, pp. 44-51.
    • (2005) Proc. 9th Int'l Symp. Wearable Computers (ISWC 05) , pp. 44-51
    • Patterson, D.1
  • 4
    • 33144457479 scopus 로고    scopus 로고
    • RFID Security and Privacy: A Research Survey
    • Feb
    • A. Juels, "RFID Security and Privacy: A Research Survey," IEEE J. Selected Areas in Communications, Feb. 2006, pp. 381-395.
    • (2006) IEEE J. Selected Areas in Communications , pp. 381-395
    • Juels, A.1
  • 6
    • 84861294968 scopus 로고    scopus 로고
    • Privacy and Proportionality: Adapting Legal Evaluation Techniques to Inform Design in Ubiquitous Computing
    • ACM Press
    • G. Iachello et al., "Privacy and Proportionality: Adapting Legal Evaluation Techniques to Inform Design in Ubiquitous Computing," Proc. SIGCHI Conf. Human Factors in Computing Systems, ACM Press, 2005, pp. 91-100.
    • (2005) Proc. SIGCHI Conf. Human Factors in Computing Systems , pp. 91-100
    • Iachello, G.1
  • 8
    • 35348854758 scopus 로고    scopus 로고
    • S. Intille et al., New Challenges for Privacy Law: Wearable Computers that Create Electronic Digital Diaries, tech. report, MIT Dept. of Architecture House_n, Sept. 2003.
    • S. Intille et al., New Challenges for Privacy Law: Wearable Computers that Create Electronic Digital Diaries, tech. report, MIT Dept. of Architecture House_n, Sept. 2003.
  • 9
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-Preserving Data Mining
    • R. Agrawal et al., "Privacy-Preserving Data Mining," ACM SIGMOD Record, vol. 29, no. 2,2000, pp. 439-450.
    • (2000) ACM SIGMOD Record , vol.29 , Issue.2 , pp. 439-450
    • Agrawal, R.1
  • 12
    • 19944367736 scopus 로고    scopus 로고
    • Personal Privacy through Understanding and Action
    • S. Lederer et al., "Personal Privacy through Understanding and Action," Personal Ubiquitous Computing, vol. 8, no. 6, 2004, pp. 440-454.
    • (2004) Personal Ubiquitous Computing , vol.8 , Issue.6 , pp. 440-454
    • Lederer, S.1
  • 13
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by Design: Principles of Privacy-Aware Ubiquitous Systems
    • Proc. Ubiquitous Computing 3rd Int'l Conf, Ubicornp 01, Springer
    • M. Langheinrich, "Privacy by Design: Principles of Privacy-Aware Ubiquitous Systems," Proc. Ubiquitous Computing 3rd Int'l Conf. (Ubicornp 01), LNCS 2201, Springer, 2001, pp. 273-291.
    • (2001) LNCS , vol.2201 , pp. 273-291
    • Langheinrich, M.1
  • 14
    • 35348905266 scopus 로고    scopus 로고
    • Protecting User Data in Ubiquitous Computing
    • Privacy Enhancing Technologies, Springer
    • Y. Duan and J. Canny, "Protecting User Data in Ubiquitous Computing," Privacy Enhancing Technologies, LNCS 3424, Springer, 2004, pp. 273-291.
    • (2004) LNCS , vol.3424 , pp. 273-291
    • Duan, Y.1    Canny, J.2
  • 15
    • 3142702944 scopus 로고    scopus 로고
    • Extending Query Rewriting Techniques for Fine-Grained Access Control
    • ACM Press
    • S. Rizvi et al., "Extending Query Rewriting Techniques for Fine-Grained Access Control," Proc. SIGMOD, ACM Press, 2004, pp. 551-562.
    • (2004) Proc. SIGMOD , pp. 551-562
    • Rizvi, S.1
  • 16
    • 33745860463 scopus 로고    scopus 로고
    • Design and Experimental Analysis of Continuous Location Tracking Techniques for Wizard of Oz Testing
    • ACM Press
    • Y. Li et al., "Design and Experimental Analysis of Continuous Location Tracking Techniques for Wizard of Oz Testing," Proc. SIGCHI Conf. Human Factors in Computing Systems, ACM Press, 2006, pp. 1019-1022.
    • (2006) Proc. SIGCHI Conf. Human Factors in Computing Systems , pp. 1019-1022
    • Li, Y.1
  • 17
    • 35348867810 scopus 로고    scopus 로고
    • tech. report UW-CSE-07-03-01, Univ. of Washington, Computer Science and Engineering Dept, Mar
    • N. Khoussainova et al., "Probabilistic RFID Data Management," tech. report UW-CSE-07-03-01, Univ. of Washington, Computer Science and Engineering Dept., Mar. 2007.
    • (2007) Probabilistic RFID Data Management
    • Khoussainova, N.1
  • 18
    • 4544259863 scopus 로고    scopus 로고
    • An Architecture for PrivacySensitive Ubiquitous Computing
    • ACM Press
    • J. Hong et al., " An Architecture for PrivacySensitive Ubiquitous Computing," Proc. Mobisys, ACM Press, 2004, pp. 177-189.
    • (2004) Proc. Mobisys , pp. 177-189
    • Hong, J.1
  • 20
    • 33745842288 scopus 로고    scopus 로고
    • Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real World
    • ACM Press
    • G. Iachello et al., "Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real World," Proc. SIGCHI Conf. Human Factors in Computing Systems, ACM Press, 2006, pp. 1009-1018.
    • (2006) Proc. SIGCHI Conf. Human Factors in Computing Systems , pp. 1009-1018
    • Iachello, G.1
  • 22
    • 38049003038 scopus 로고    scopus 로고
    • Virtual Walls
    • Proc. Pervasive, Springer, May
    • A. Kapadia et al., "Virtual Walls," Proc. Pervasive, LNCS 4480, Springer, May 2007, pp. 162-179.
    • (2007) LNCS , vol.4480 , pp. 162-179
    • Kapadia, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.