메뉴 건너뛰기




Volumn 4, Issue 6, 2008, Pages 819-835

Shadow attacks on users' anonymity in pervasive computing environments

Author keywords

Anonymity; Context awareness; Formal models of privacy threats; Privacy

Indexed keywords

COMPUTER PRIVACY; DATA PRIVACY; NETWORK SECURITY;

EID: 55349130337     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2008.04.008     Document Type: Article
Times cited : (11)

References (21)
  • 3
    • 84867344503 scopus 로고    scopus 로고
    • Context attributes: An approach to enable context-awareness for service discovery
    • SAINT 2003, IEEE Computer Society
    • Lee C., and Helal A. Context attributes: An approach to enable context-awareness for service discovery. Proceedings of the 2003 Symposium on Applications and the Internet. SAINT 2003 (2003), IEEE Computer Society 22-30
    • (2003) Proceedings of the 2003 Symposium on Applications and the Internet , pp. 22-30
    • Lee, C.1    Helal, A.2
  • 4
    • 35248833451 scopus 로고    scopus 로고
    • CAPEUS: An architecture for context-aware selection and execution of services
    • Proceedings of the Third International Working Conference on Distributed Applications and Interoperable Systems. DAIS, Kluwer
    • Samulowitz M., Michahelles F., and Linnhoff-Popien C. CAPEUS: An architecture for context-aware selection and execution of services. Proceedings of the Third International Working Conference on Distributed Applications and Interoperable Systems. DAIS. IFIP Conference Proceedings vol. 198 (2001), Kluwer 23-40
    • (2001) IFIP Conference Proceedings , vol.198 , pp. 23-40
    • Samulowitz, M.1    Michahelles, F.2    Linnhoff-Popien, C.3
  • 5
    • 34547971990 scopus 로고    scopus 로고
    • Navitime: Supporting pedestrian navigation in the real world
    • Arikawa M., Konomi S., and Ohnishi K. Navitime: Supporting pedestrian navigation in the real world. IEEE Pervasive Computing 6 3 (2007) 21-29
    • (2007) IEEE Pervasive Computing , vol.6 , Issue.3 , pp. 21-29
    • Arikawa, M.1    Konomi, S.2    Ohnishi, K.3
  • 6
    • 0034539093 scopus 로고    scopus 로고
    • experiences of developing and deploying a context-aware tourist Guide: The GUIDE project
    • ACM
    • Cheverst K., Davies N., Mitchell K., and Friday A. experiences of developing and deploying a context-aware tourist Guide: The GUIDE project. Proceedings of MOBICOM'00 (2000), ACM 20-31
    • (2000) Proceedings of MOBICOM'00 , pp. 20-31
    • Cheverst, K.1    Davies, N.2    Mitchell, K.3    Friday, A.4
  • 8
    • 33645320527 scopus 로고    scopus 로고
    • Using ubiquitous computing in interactive mobile marketing
    • Kurkovsky S., and Harihar K. Using ubiquitous computing in interactive mobile marketing. Personal and Ubiquitous Computing 10 4 (2006) 227-240
    • (2006) Personal and Ubiquitous Computing , vol.10 , Issue.4 , pp. 227-240
    • Kurkovsky, S.1    Harihar, K.2
  • 9
    • 24644520728 scopus 로고    scopus 로고
    • Towards security and privacy for pervasive computing
    • Proceedings of International Symposium on Software Security, Springer
    • Campbell R., Al-Muhtadi J., Naldurg P., Sampemane G., and Mickunas M. Towards security and privacy for pervasive computing. Proceedings of International Symposium on Software Security. Lecture Notes in Computer Science vol. 2609 (2003), Springer 1-15
    • (2003) Lecture Notes in Computer Science , vol.2609 , pp. 1-15
    • Campbell, R.1    Al-Muhtadi, J.2    Naldurg, P.3    Sampemane, G.4    Mickunas, M.5
  • 11
    • 24944448005 scopus 로고    scopus 로고
    • Context obfuscation for privacy via ontological descriptions
    • Proceeding of First International Workshop on Location- and Context-Awareness. LoCA, Springer
    • Wishart R., Henricksen K., and Indulska J. Context obfuscation for privacy via ontological descriptions. Proceeding of First International Workshop on Location- and Context-Awareness. LoCA. Lecture Notes in Computer Science vol. 3479 (2005), Springer 276-288
    • (2005) Lecture Notes in Computer Science , vol.3479 , pp. 276-288
    • Wishart, R.1    Henricksen, K.2    Indulska, J.3
  • 12
    • 24744468399 scopus 로고    scopus 로고
    • H.S. Cheng, D. Zhang, J.G. Tan, Protection of privacy in pervasive computing environments, in: ITCC '05: Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC'05, vol. II, IEEE Computer Society, 2005, pp. 242-247
    • H.S. Cheng, D. Zhang, J.G. Tan, Protection of privacy in pervasive computing environments, in: ITCC '05: Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC'05, vol. II, IEEE Computer Society, 2005, pp. 242-247
  • 14
  • 15
    • 33646153058 scopus 로고    scopus 로고
    • Protecting privacy against location-based personal identification
    • Proc. of the 2nd workshop on Secure Data Management. SDM, Springer
    • Bettini C., Wang X.S., and Jajodia S. Protecting privacy against location-based personal identification. Proc. of the 2nd workshop on Secure Data Management. SDM. LNCS vol. 3674 (2005), Springer 185-199
    • (2005) LNCS , vol.3674 , pp. 185-199
    • Bettini, C.1    Wang, X.S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.