메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Rationalexposure: A game theoretic approach to optimize identity exposure in pervasive computing environmnents

Author keywords

Game theory; Ideiitity management; Pervasive computing; Privacy

Indexed keywords

DAILY ACTIVITY; DIGITAL FORMS; FUNDAMENTAL PROBLEM; IDEIITITY MANAGEMENT; IDENTITY INFORMATION; PERSONAL IDENTITY; PERSONAL INFORMATION; PERSONAL PREFERENCES; PERVASIVE COMPUTING; PERVASIVE COMPUTING ENVIRONMENT; PRIVACY; PRIVACY PROTECTION; SERVICE PROVIDER;

EID: 70349338950     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PERCOM.2009.4912755     Document Type: Conference Paper
Times cited : (5)

References (21)
  • 2
    • 33746862956 scopus 로고    scopus 로고
    • E. Dyson, Privacy Protection: Time to Think and Act Locally and Globally, First Monday, July, 2006.
    • E. Dyson, "Privacy Protection: Time to Think and Act Locally and Globally", First Monday, vol. July, 2006.
  • 3
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
    • Ubicomp 2001 Proceedings, of
    • M. Langheinrich, "Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems", in Ubicomp 2001 Proceedings, volume 2201 of Lecture Notes in Computer Science, 2001, pp. 273-291.
    • (2001) Lecture Notes in Computer Science , vol.2201 , pp. 273-291
    • Langheinrich, M.1
  • 4
    • 2942524994 scopus 로고    scopus 로고
    • Location Privacy in Pervasive Computing
    • January-March, pp
    • A. Beresford and F. Stajano, "Location Privacy in Pervasive Computing", IEEE Pervasive Computing, vol. January-March, pp. 47-55, 2003.
    • (2003) IEEE Pervasive Computing, vol , pp. 47-55
    • Beresford, A.1    Stajano, F.2
  • 7
  • 12
    • 0038007758 scopus 로고    scopus 로고
    • Designing a Social Protocol: Lessons Learned from the Platform for Privacy Preferences Project
    • D. Waterman, Ed, Mahwah: Lawrence Erlbaum Associates
    • L. F. Cranor and J. Reagle, "Designing a Social Protocol: Lessons Learned from the Platform for Privacy Preferences Project", in Telephony, the Internet, and the Meda, D. Waterman, Ed.: Mahwah: Lawrence Erlbaum Associates, 1998.
    • (1998) Telephony, the Internet, and the Meda
    • Cranor, L.F.1    Reagle, J.2
  • 13
    • 7644223159 scopus 로고    scopus 로고
    • Maintaining privacy in pervasive computing enabling acceptance of sensor-based services
    • A. Soppera and T. Burbridge, "Maintaining privacy in pervasive computing enabling acceptance of sensor-based services", BT Technology Journal, vol. 22, pp. 106-118, 2004.
    • (2004) BT Technology Journal , vol.22 , pp. 106-118
    • Soppera, A.1    Burbridge, T.2
  • 15
    • 38949134629 scopus 로고    scopus 로고
    • Security Assertion Markup Language (SAML) V2.0 Technical Overview
    • OASIS Open, 9 October
    • N. Ragouzis, J. Hughes, R. Philpott, and E. Maler, "Security Assertion Markup Language (SAML) V2.0 Technical Overview", OASIS Open, http://www.oasis.open.org/committees/documents.php?wg-abbrev=security, 9 October 2006.
    • (2006)
    • Ragouzis, N.1    Hughes, J.2    Philpott, R.3    Maler, E.4
  • 20
    • 35348820605 scopus 로고    scopus 로고
    • Private and Secure Service Discovery via Progressive and Probabilistic Exposure
    • F. Zhu, W. Zhu, M. Mutka, and L. Ni, "Private and Secure Service Discovery via Progressive and Probabilistic Exposure", IEEE Transactions on Parallel and Distributed Systems, vol. 18, pp. 1565-1577, 2007.
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , pp. 1565-1577
    • Zhu, F.1    Zhu, W.2    Mutka, M.3    Ni, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.