메뉴 건너뛰기




Volumn 1, Issue 2, 2007, Pages 129-146

Sentry@Home - Leveraging the smart home for privacy in pervasive computing

Author keywords

[No Author keywords available]

Indexed keywords

ADDED VALUES; CONTEXT AWARE SERVICES; HOME ENVIRONMENT; HOSTILE ENVIRONMENTS; INTEGRAL PART; PERSONALIZED CONTEXT-AWARE SERVICES; PERVASIVE COMPUTING ENVIRONMENT; PERVASIVE COMPUTING SYSTEMS; PRIVACY ENFORCEMENT; SENSITIVE DATAS; SMART HOMES; SOFTWARE INFRASTRUCTURE; TRACKING DEVICES; USER-CENTRIC;

EID: 52149093804     PISSN: 19754094     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (25)

References (25)
  • 2
    • 80455142106 scopus 로고    scopus 로고
    • Pictures of the Future., PoF Fall 2004, Siemens AG. Available at
    • Pictures of the Future. "Communications, Always-on Society", PoF Fall 2004, Siemens AG. Available at: http://www.siemens.com/pof
    • Communications, Always-on Society
  • 3
    • 80455175772 scopus 로고    scopus 로고
    • Pictures of the Future, PoF Fall 2005, Siemens AG. Available at
    • Pictures of the Future. "T-Com House: At Home in the Future", PoF Fall 2005, Siemens AG. Available at: http://www.siemens.com/pof
    • T-Com House: At Home in the Future
  • 7
    • 4544259863 scopus 로고    scopus 로고
    • In the ACM proceedings of the 2nd international conference on Mobile systems, applications, and services
    • Jason I. Hong and James A. Landay. "An architecture for privacy-sensitive ubiquitous computing". In the ACM proceedings of the 2nd international conference on Mobile systems, applications, and services, pages 177-189, 2004.
    • (2004) An architecture for privacy-sensitive ubiquitous computing , pp. 177-189
    • Hong, J.I.1    Landay, J.A.2
  • 8
    • 19944367736 scopus 로고    scopus 로고
    • Personal privacy through understanding and action: five pitfalls for designers
    • S. Lederer, J. I. Hong, K. Dey and A. Landay. "Personal privacy through understanding and action: five pitfalls for designers". Personal Ubiquitous Computing, volume 8, pages 440-454, 2004.
    • (2004) Personal Ubiquitous Computing , vol.8 , pp. 440-454
    • Lederer, S.1    Hong, J.I.2    Dey, K.3    Landay, A.4
  • 9
    • 0028726831 scopus 로고
    • Policy driven management for distributed systems
    • M. Sloman. "Policy driven management for distributed systems". Journal of Network and Systems Management, volume 2, pages 333-360, 1994.
    • (1994) Journal of Network and Systems Management , vol.2 , pp. 333-360
    • Sloman, M.1
  • 11
    • 19944372788 scopus 로고    scopus 로고
    • Keeping ubiquitous computing to yourself: a practical model for user control of privacy
    • B. A. Price, K. Adam, and B. Nuseibeh. "Keeping ubiquitous computing to yourself: a practical model for user control of privacy". International Journal of Human-Computer Studies, volume 63, pages 228-253, 2005.
    • (2005) International Journal of Human-Computer Studies , vol.63 , pp. 228-253
    • Price, B.A.1    Adam, K.2    Nuseibeh, B.3
  • 17
    • 33750111616 scopus 로고    scopus 로고
    • Location Information Privacy
    • Geographic Location in the Internet, Kluwer Academic Publishers
    • Jorge R. Cuellar. "Location Information Privacy". Geographic Location in the Internet, Kluwer Academic Publishers, pages 179-212, 2002.
    • (2002) , pp. 179-212
    • Cuellar, J.R.1
  • 19
    • 84937411601 scopus 로고    scopus 로고
    • Marc Langheinrich, In the LNCS Proceedings of the 4th International Conference on Ubiquitous Computing
    • Marc Langheinrich. "A Privacy Awareness System for Ubiquitous Computing Environments". In the LNCS Proceedings of the 4th International Conference on Ubiquitous Computing, pages 237-245, 2002.
    • (2002) A Privacy Awareness System for Ubiquitous Computing Environments , pp. 237-245
  • 20
    • 2342502819 scopus 로고    scopus 로고
    • Preserving Privacy in Environments with Location-Based Applications
    • G. Myles, A. Friday and Nigel Davies. "Preserving Privacy in Environments with Location-Based Applications". IEEE Pervasive Computing, volume 2, pages 56-64, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , pp. 56-64
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 24
    • 2942524994 scopus 로고    scopus 로고
    • Location Privacy in Pervasive Computing
    • Alastair R. Beresford and Frank Stajano. "Location Privacy in Pervasive Computing". IEEE Pervasive Computing, volume 2, pages 46-55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 25
    • 24944432404 scopus 로고    scopus 로고
    • A Formal Model of Obfuscation and Negotiation for Location Privacy
    • Matt Duckham and Lars Kulik. "A Formal Model of Obfuscation and Negotiation for Location Privacy". Pervasive, pages 152-170, 2005.
    • (2005) Pervasive , pp. 152-170
    • Duckham, M.1    Kulik, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.