-
2
-
-
19944367736
-
Personal privacy through understanding and action: Five pitfalls for designers
-
Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: five pitfalls for designers. Personal and Ubiquitous Computing 8(6), 440-454 (2004)
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 440-454
-
-
Lederer, S.1
Hong, J.I.2
Dey, A.K.3
Landay, J.A.4
-
3
-
-
84890172068
-
Privacy protection through anonymity in location-based services
-
Bettini, C., Mascetti, S., Wang, X.S.: Privacy Protection through Anonymity in Location-based Services. In: Handbook of Database Security: Applications and Trends, pp. 509-530 (2008)
-
(2008)
Handbook of Database Security: Applications and Trends
, pp. 509-530
-
-
Bettini, C.1
Mascetti, S.2
Wang, X.S.3
-
4
-
-
55349130337
-
Shadow attacks on vasive computing environments
-
Riboni, D., Pareschi, L., Bettini, C.: Shadow attacks on vasive computing environments. Pervasive and Mobile Computing 4(6), 819-835 (2008)
-
(2008)
Pervasive and Mobile Computing
, vol.4
, Issue.6
, pp. 819-835
-
-
Riboni, D.1
Pareschi, L.2
Bettini, C.3
-
6
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
ACM Press, New York
-
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD 2008), pp. 121-132. ACM Press, New York (2008)
-
(2008)
Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD 2008)
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.L.5
-
7
-
-
37849032496
-
Location privacy protection through obfuscation-based techniques
-
Barker, S., Ahn, G.-J. (eds.). Data and Applications Security 2007. Springer, Heidelberg
-
Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Sama-rati, P.: Location Privacy Protection Through Obfuscation-Based Techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.4602, pp. 47-60. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4602
, pp. 47-60
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
De Capitani Di Vimercati, S.4
Samarati, P.5
-
8
-
-
52649118020
-
Space twist: Managing the trade-offs among location privacy query performance and query accuracy in mobile services
-
IEEE Computer Society Press, Los Alamitos
-
Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In: Proceedings of the 24th International Conference on Data Engineering (ICDE 2008), pp. 366-375. IEEE Computer Society Press, Los Alamitos (2008)
-
(2008)
Proceedings of the 24th International Conference on Data Engineering (ICDE 2008)
, pp. 366-375
-
-
Yiu, M.L.1
Jensen, C.S.2
Huang, X.3
Lu, H.4
-
10
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
Gedik, B., Liu, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE Transactions on Mobile Computing 7(1), 1-18 (2008)
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
13
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84-90 (1981)
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
14
-
-
0001777423
-
Anonymous web transactions with crowds
-
Reiter, M.K., Rubin, A.D.: Anonymous web transactions with crowds. Commun. ACM 42(2), 32-48 (1999)
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 32-48
-
-
Reiter, M.K.1
Rubin, A.D.2
-
16
-
-
85084161366
-
Tor: The second-generation onion router
-
USENIX Association
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: SSYM 2004: Proceedings of the 13th conference on USENIX Security Symposium, p. 21. USENIX Association (2004)
-
(2004)
SSYM 2004: Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
17
-
-
0005063385
-
Onion routing
-
Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM 42(2), 39-41 (1999)
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
18
-
-
0036360781
-
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
-
IEEE Computer Society Press, Los Alamitos
-
Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M.D., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS 2002), p. 74. IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
Proceedings of the 22 Nd International Conference on Distributed Computing Systems (ICDCS 2002)
, pp. 74
-
-
Al-Muhtadi, J.1
Campbell, R.2
Kapadia, A.3
Mickunas, M.D.4
Yi, S.5
-
19
-
-
84958035648
-
Secure multi-party computational geometry
-
Dehne, F., Sack, J.-R., Tamassia, R. (eds.). Springer, Heidelberg
-
Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol.2125, pp. 165-179. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2125
, pp. 165-179
-
-
Atallah, M.J.1
Du, W.2
-
20
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
Focardi, R., Gorrieri, R. (eds.). Springer, Heidelberg
-
Samarati, P., De Capitani di Vimercati, S.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000, vol.2171, pp. 137-196. Springer, Heidelberg (2001)
-
(2001)
FOSAD 2000
, vol.2171
, pp. 137-196
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
21
-
-
15944413918
-
Context sensitivity in role-based access control
-
Kumar, A., Karnik, N.M., Chafle, G.: Context sensitivity in role-based access control. Operating Systems Review 36(3), 53-66 (2002)
-
(2002)
Operating Systems Review
, vol.36
, Issue.3
, pp. 53-66
-
-
Kumar, A.1
Karnik, N.M.2
Chafle, G.3
-
22
-
-
84948995473
-
A context-aware security architecture for emerging applications
-
IEEE Computer Society Press, Los Alamitos
-
Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A Context-Aware Security Architecture for Emerging Applications. In: Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), pp. 249-260. IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002)
, pp. 249-260
-
-
Covington, M.J.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
23
-
-
34748870679
-
Proteus: A semantic context-aware adaptive policy model
-
IEEE Computer Society, Los Alamitos
-
Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: Proteus: A Semantic Context-Aware Adaptive Policy Model. In: Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks(POLICY 2007), pp. 129-140. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks(POLICY 2007)
, pp. 129-140
-
-
Toninelli, A.1
Montanari, R.2
Kagal, L.3
Lassila, O.4
-
24
-
-
0028513932
-
Access control: Principles and practice
-
Sandhu, R., Samarati, P.: Access Control: Principles and Practice. IEEE Communications 32(9), 40-48 (1994)
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
25
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
26
-
-
33749660336
-
Avoiding privacy violations caused by context-sensitive services
-
Hengartner, U., Steenkiste, P.: Avoiding Privacy Violations Caused by Context-Sensitive Services. Pervasive and Mobile Computing 2(3), 427-452 (2006)
-
(2006)
Pervasive and Mobile Computing
, vol.2
, Issue.3
, pp. 427-452
-
-
Hengartner, U.1
Steenkiste, P.2
-
27
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal of Computing 18(1), 186-208 (1989)
-
(1989)
SIAM Journal of Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
28
-
-
37349048863
-
Zero-knowledge-based user authentication technique in context-aware system
-
Wang, C.D., Feng, L.C., Wang, Q.: Zero-Knowledge-Based User Authentication Technique in Context-aware System. In: International Conference on Multimedia and Ubiquitous Engineering, 2007. MUE 2007, pp. 874-879 (2007)
-
(2007)
International Conference on Multimedia and Ubiquitous Engineering, 2007. MUE 2007
, pp. 874-879
-
-
Wang, C.D.1
Feng, L.C.2
Wang, Q.3
-
30
-
-
51349104092
-
-
January
-
Schulzrinne, H., Tschofenig, H., Morris, J., Cuellar, J., Polk, J.: Geolocation policy: A document format for expressing privacy preferences for location Information (January 2009), http://www.ietf.org/internet-drafts/draft- ietf-geopriv-policy-18.txt
-
(2009)
Geolocation Policy: A Document Format for Expressing Privacy Preferences for Location Information
-
-
Schulzrinne, H.1
Tschofenig, H.2
Morris, J.3
Cuellar, J.4
Polk, J.5
-
31
-
-
2342620647
-
Enabling context-aware and privacy-conscious user data sharing
-
IEEE Computer Society, Los Alamitos
-
Hull, R., Kumar, B., Lieuwen, D., Patel-Schneider, P., Sahuguet, A., Varadarajan, S., Vyas, A.: Enabling Context-Aware and Privacy-Conscious User Data Sharing. In: Proceedings of the 2004 IEEE International Conference on Mobile Data Management (MDM 2004), pp. 187-198. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
Proceedings of the 2004 IEEE International Conference on Mobile Data Management (MDM 2004)
, pp. 187-198
-
-
Hull, R.1
Kumar, B.2
Lieuwen, D.3
Patel-Schneider, P.4
Sahuguet, A.5
Varadarajan, S.6
Vyas, A.7
-
32
-
-
37849053407
-
Efficient security policy enforcement in a location based service environment
-
Barker, S., Ahn, G.-J. (eds.). Data and Applications Security 2007. Springer, Heidelberg
-
Atluri, V., Shin, H.: Efficient Security Policy Enforcement in a Location Based Service Environment. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.4602, pp. 61-76. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4602
, pp. 61-76
-
-
Atluri, V.1
Shin, H.2
-
34
-
-
18844418489
-
Context-based access control management in ubiquitous environments
-
IEEE Computer Society Press, Los Alamitos
-
Corradi, A., Montanari, R., Tibaldi, D.: Context-Based Access Control Management in Ubiquitous Environments. In: Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), pp. 253-260. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004)
, pp. 253-260
-
-
Corradi, A.1
Montanari, R.2
Tibaldi, D.3
-
35
-
-
33745124824
-
A privacy service for context-aware mobile computing
-
IEEE Computer Society, Los Alamitos
-
Sacramento, V., Endler, M., Nascimento, F.N.: A Privacy Service for Context-aware Mobile Computing. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM 2005), pp. 182-193. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM 2005)
, pp. 182-193
-
-
Sacramento, V.1
Endler, M.2
Nascimento, F.N.3
-
36
-
-
40949089096
-
A study on context-aware privacy protection for personal information
-
IEEE Computer Society, Los Alamitos
-
Zhang, Q., Qi, Y., Zhao, J., Hou, D., Zhao, T., Liu, L.: A Study on Context-aware Privacy Protection for Personal Information. In: Proceedings of the 16th IEEE International Conference on Computer Communications and Networks (ICCCN 2007), pp. 1351-1358. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Proceedings of the 16th IEEE International Conference on Computer Communications and Networks (ICCCN 2007)
, pp. 1351-1358
-
-
Zhang, Q.1
Qi, Y.2
Zhao, J.3
Hou, D.4
Zhao, T.5
Liu, L.6
-
37
-
-
10944251971
-
Data obfuscation: Anonymity and desensitization of usable data sets
-
Bakken, D.E., Parameswaran, R., Blough, D.M., Franz, A.A., Palmer, T.J.: Data Obfuscation: Anonymity and Desensitization of Usable Data Sets. IEEE Security & Privacy 2(6), 34-41 (2004)
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.6
, pp. 34-41
-
-
Bakken, D.E.1
Parameswaran, R.2
Blough, D.M.3
Franz, A.A.4
Palmer, T.J.5
-
39
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
Gellersen, H.-W., Want, R., Schmidt, A. (eds.). Pervasive 2005. Springer, Heidelberg
-
Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) Pervasive 2005. LNCS, vol.3468, pp. 152-170. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3468
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
40
-
-
13244276903
-
Semantic web technologies to reconcile privacy and context awareness
-
Gandon, F.L., Sadeh, N.M.: Semantic web technologies to reconcile privacy and context awareness. J. Web Sem. 1(3), 241-260 (2004)
-
(2004)
J. Web Sem
, vol.1
, Issue.3
, pp. 241-260
-
-
Gandon, F.L.1
Sadeh, N.M.2
-
41
-
-
38049060644
-
Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system
-
Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.). UIC 2007. Springer, Heidelberg
-
Wishart, R., Henricksen, K., Indulska, J.: Context Privacy and Obfuscation Supported by Dynamic Context Source Discovery and Processing in a Context Management System. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol.4611, pp. 929-940. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4611
, pp. 929-940
-
-
Wishart, R.1
Henricksen, K.2
Indulska, J.3
-
42
-
-
50949127576
-
Quality-of-Context and its use for Protecting Privacy in Context Aware Systems
-
Sheikh, K., Wegdam, M., van Sinderen, M.: Quality-of-Context and its use for Protecting Privacy in Context Aware Systems. Journal of Software 3(3), 83-93 (2008)
-
(2008)
Journal of Software
, vol.3
, Issue.3
, pp. 83-93
-
-
Sheikh, K.1
Wegdam, M.2
Van Sinderen, M.3
-
44
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity -a proposal for terminology
-
Federrath, H. (ed.). Designing Privacy Enhancing Technologies. Springer, Heidelberg
-
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity -a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.2009, pp. 1-9. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
45
-
-
51349116631
-
A profile anonymization model for privacy in a personalized location based service environment
-
Shin, H., Atluri, V., Vaidya, J.: A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. In: Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), pp. 73-80 (2008)
-
(2008)
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008)
, pp. 73-80
-
-
Shin, H.1
Atluri, V.2
Vaidya, J.3
-
46
-
-
70349466549
-
Privacy-preserving event detection in pervasive spaces
-
Hore, B., Wickramasuriya, J., Mehrotra, S., Venkatasubramanian, N., Massaguer, D.: Privacy-Preserving Event Detection in Pervasive Spaces. In: Proceedings of the 7th IEEE International Conference on Pervasive Computing and Communications (PerCom 2009) (2009)
-
(2009)
Proceedings of the 7th IEEE International Conference on Pervasive Computing and Communications (PerCom 2009)
-
-
Hore, B.1
Wickramasuriya, J.2
Mehrotra, S.3
Venkatasubramanian, N.4
Massaguer, D.5
-
47
-
-
33749607006
-
L-Diversity: Privacy beyond k-anonymity
-
IEEE Computer Society, Los Alamitos
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity. In: Proceedings of ICDE 2006. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
Proceedings of ICDE 2006
-
-
MacHanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
48
-
-
77951438833
-
Preserving anonymity of recurrent location-based queries
-
to appear
-
Riboni, D., Pareschi, L., Bettini, C., Jajodia, S.: Preserving Anonymity of Recurrent Location-based Queries. In: Proceedings of the 16th International Symposium on Temporal Representation and Reasoning (TIME 2009) (to appear, 2009)
-
(2009)
Proceedings of the 16th International Symposium on Temporal Representation and Reasoning (TIME 2009)
-
-
Riboni, D.1
Pareschi, L.2
Bettini, C.3
Jajodia, S.4
-
49
-
-
49149123423
-
Composition and generalization of context data for privacy preservation
-
IEEE Computer Society, Los Alamitos
-
Pareschi, L., Riboni, D., Agostini, A., Bettini, C.: Composition and Generalization of Context Data for Privacy Preservation. In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), Proceedings of the Workshops, pp. 429-433. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), Proceedings of the Workshops
, pp. 429-433
-
-
Pareschi, L.1
Riboni, D.2
Agostini, A.3
Bettini, C.4
-
50
-
-
50649098826
-
Using user preferences to enhance privacy in pervasive systems
-
IEEE Computer Society, Los Alamitos
-
Papadopoulou, E., McBurney, S., Taylor, N., Williams, M.H., Dolinar, K., Neubauer, M.: Using User Preferences to Enhance Privacy in Pervasive Systems. In: Proceedings of the Third International Conference on Systems (ICONS 2008), pp. 271-276. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
Proceedings of the Third International Conference on Systems (ICONS 2008)
, pp. 271-276
-
-
Papadopoulou, E.1
McBurney, S.2
Taylor, N.3
Williams, M.H.4
Dolinar, K.5
Neubauer, M.6
-
51
-
-
44649150419
-
AnonySense: Opportunistic and privacy-preserving context collection
-
Indulska, J., Patterson, D.J., Rodden, T., Ott, M. (eds.). Pervasive 2008. Springer, Heidelberg
-
Kapadia, A., Triandopoulos, N., Cornelius, C., Peebles, D., Kotz, D.: AnonySense: Opportunistic and Privacy-Preserving Context Collection. In: Indulska, J., Patterson, D.J., Rodden, T., Ott, M. (eds.) Pervasive 2008. LNCS, vol.5013, pp. 280-297. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5013
, pp. 280-297
-
-
Kapadia, A.1
Triandopoulos, N.2
Cornelius, C.3
Peebles, D.4
Kotz, D.5
-
52
-
-
85015402934
-
Use of Elliptic Curves in Cryptography
-
Williams, H.C. (ed.). CRYPTO 1985. Springer, Heidelberg
-
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.218, pp. 417-426. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
53
-
-
33745948528
-
JavaTM on the bare metal of wireless sensor devices: The squawk Java virtual machine
-
ACM Press, New York
-
Simon, D., Cifuentes, C., Cleal, D., Daniels, J., White, D.: JavaTM on the bare metal of wireless sensor devices: the squawk Java virtual machine. In: Proceedings of the 2nd International Conference on Virtual Execution Environments (VEE 2006), pp. 78-88. ACM Press, New York (2006)
-
(2006)
Proceedings of the 2nd International Conference on Virtual Execution Environments (VEE 2006)
, pp. 78-88
-
-
Simon, D.1
Cifuentes, C.2
Cleal, D.3
Daniels, J.4
White, D.5
|