메뉴 건너뛰기




Volumn 5599, Issue , 2009, Pages 151-172

Privacy in georeferenced context-aware services: A survey

Author keywords

[No Author keywords available]

Indexed keywords

CONTEXT AWARE SERVICES; CONTEXT DATA; INTERNET SERVICES; LOCATION-BASED SERVICES; PRIVACY CONCERNS; PRIVACY PRESERVATION; SERVICE PROVIDER; TYPE OF SERVICES;

EID: 70349152687     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03511-1_7     Document Type: Conference Paper
Times cited : (21)

References (53)
  • 2
    • 19944367736 scopus 로고    scopus 로고
    • Personal privacy through understanding and action: Five pitfalls for designers
    • Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: five pitfalls for designers. Personal and Ubiquitous Computing 8(6), 440-454 (2004)
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 440-454
    • Lederer, S.1    Hong, J.I.2    Dey, A.K.3    Landay, J.A.4
  • 7
    • 37849032496 scopus 로고    scopus 로고
    • Location privacy protection through obfuscation-based techniques
    • Barker, S., Ahn, G.-J. (eds.). Data and Applications Security 2007. Springer, Heidelberg
    • Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Sama-rati, P.: Location Privacy Protection Through Obfuscation-Based Techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.4602, pp. 47-60. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4602 , pp. 47-60
    • Ardagna, C.A.1    Cremonini, M.2    Damiani, E.3    De Capitani Di Vimercati, S.4    Samarati, P.5
  • 8
    • 52649118020 scopus 로고    scopus 로고
    • Space twist: Managing the trade-offs among location privacy query performance and query accuracy in mobile services
    • IEEE Computer Society Press, Los Alamitos
    • Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In: Proceedings of the 24th International Conference on Data Engineering (ICDE 2008), pp. 366-375. IEEE Computer Society Press, Los Alamitos (2008)
    • (2008) Proceedings of the 24th International Conference on Data Engineering (ICDE 2008) , pp. 366-375
    • Yiu, M.L.1    Jensen, C.S.2    Huang, X.3    Lu, H.4
  • 10
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • Gedik, B., Liu, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE Transactions on Mobile Computing 7(1), 1-18 (2008)
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 13
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84-90 (1981)
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.1
  • 14
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous web transactions with crowds
    • Reiter, M.K., Rubin, A.D.: Anonymous web transactions with crowds. Commun. ACM 42(2), 32-48 (1999)
    • (1999) Commun. ACM , vol.42 , Issue.2 , pp. 32-48
    • Reiter, M.K.1    Rubin, A.D.2
  • 19
    • 84958035648 scopus 로고    scopus 로고
    • Secure multi-party computational geometry
    • Dehne, F., Sack, J.-R., Tamassia, R. (eds.). Springer, Heidelberg
    • Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol.2125, pp. 165-179. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2125 , pp. 165-179
    • Atallah, M.J.1    Du, W.2
  • 20
    • 84964853055 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms
    • Focardi, R., Gorrieri, R. (eds.). Springer, Heidelberg
    • Samarati, P., De Capitani di Vimercati, S.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000, vol.2171, pp. 137-196. Springer, Heidelberg (2001)
    • (2001) FOSAD 2000 , vol.2171 , pp. 137-196
    • Samarati, P.1    De Capitani Di Vimercati, S.2
  • 21
    • 15944413918 scopus 로고    scopus 로고
    • Context sensitivity in role-based access control
    • Kumar, A., Karnik, N.M., Chafle, G.: Context sensitivity in role-based access control. Operating Systems Review 36(3), 53-66 (2002)
    • (2002) Operating Systems Review , vol.36 , Issue.3 , pp. 53-66
    • Kumar, A.1    Karnik, N.M.2    Chafle, G.3
  • 24
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • Sandhu, R., Samarati, P.: Access Control: Principles and Practice. IEEE Communications 32(9), 40-48 (1994)
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 26
    • 33749660336 scopus 로고    scopus 로고
    • Avoiding privacy violations caused by context-sensitive services
    • Hengartner, U., Steenkiste, P.: Avoiding Privacy Violations Caused by Context-Sensitive Services. Pervasive and Mobile Computing 2(3), 427-452 (2006)
    • (2006) Pervasive and Mobile Computing , vol.2 , Issue.3 , pp. 427-452
    • Hengartner, U.1    Steenkiste, P.2
  • 27
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal of Computing 18(1), 186-208 (1989)
    • (1989) SIAM Journal of Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 32
    • 37849053407 scopus 로고    scopus 로고
    • Efficient security policy enforcement in a location based service environment
    • Barker, S., Ahn, G.-J. (eds.). Data and Applications Security 2007. Springer, Heidelberg
    • Atluri, V., Shin, H.: Efficient Security Policy Enforcement in a Location Based Service Environment. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.4602, pp. 61-76. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4602 , pp. 61-76
    • Atluri, V.1    Shin, H.2
  • 39
    • 24944432404 scopus 로고    scopus 로고
    • A formal model of obfuscation and negotiation for location privacy
    • Gellersen, H.-W., Want, R., Schmidt, A. (eds.). Pervasive 2005. Springer, Heidelberg
    • Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) Pervasive 2005. LNCS, vol.3468, pp. 152-170. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3468 , pp. 152-170
    • Duckham, M.1    Kulik, L.2
  • 40
    • 13244276903 scopus 로고    scopus 로고
    • Semantic web technologies to reconcile privacy and context awareness
    • Gandon, F.L., Sadeh, N.M.: Semantic web technologies to reconcile privacy and context awareness. J. Web Sem. 1(3), 241-260 (2004)
    • (2004) J. Web Sem , vol.1 , Issue.3 , pp. 241-260
    • Gandon, F.L.1    Sadeh, N.M.2
  • 41
    • 38049060644 scopus 로고    scopus 로고
    • Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system
    • Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.). UIC 2007. Springer, Heidelberg
    • Wishart, R., Henricksen, K., Indulska, J.: Context Privacy and Obfuscation Supported by Dynamic Context Source Discovery and Processing in a Context Management System. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol.4611, pp. 929-940. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4611 , pp. 929-940
    • Wishart, R.1    Henricksen, K.2    Indulska, J.3
  • 42
    • 50949127576 scopus 로고    scopus 로고
    • Quality-of-Context and its use for Protecting Privacy in Context Aware Systems
    • Sheikh, K., Wegdam, M., van Sinderen, M.: Quality-of-Context and its use for Protecting Privacy in Context Aware Systems. Journal of Software 3(3), 83-93 (2008)
    • (2008) Journal of Software , vol.3 , Issue.3 , pp. 83-93
    • Sheikh, K.1    Wegdam, M.2    Van Sinderen, M.3
  • 44
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity -a proposal for terminology
    • Federrath, H. (ed.). Designing Privacy Enhancing Technologies. Springer, Heidelberg
    • Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity -a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.2009, pp. 1-9. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 1-9
    • Pfitzmann, A.1    Köhntopp, M.2
  • 51
    • 44649150419 scopus 로고    scopus 로고
    • AnonySense: Opportunistic and privacy-preserving context collection
    • Indulska, J., Patterson, D.J., Rodden, T., Ott, M. (eds.). Pervasive 2008. Springer, Heidelberg
    • Kapadia, A., Triandopoulos, N., Cornelius, C., Peebles, D., Kotz, D.: AnonySense: Opportunistic and Privacy-Preserving Context Collection. In: Indulska, J., Patterson, D.J., Rodden, T., Ott, M. (eds.) Pervasive 2008. LNCS, vol.5013, pp. 280-297. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5013 , pp. 280-297
    • Kapadia, A.1    Triandopoulos, N.2    Cornelius, C.3    Peebles, D.4    Kotz, D.5
  • 52
    • 85015402934 scopus 로고
    • Use of Elliptic Curves in Cryptography
    • Williams, H.C. (ed.). CRYPTO 1985. Springer, Heidelberg
    • Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.218, pp. 417-426. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 417-426
    • Miller, V.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.