메뉴 건너뛰기




Volumn 5896 LNCS, Issue , 2009, Pages 247-267

Middleware for pervasive spaces: Balancing privacy and utility

Author keywords

[No Author keywords available]

Indexed keywords

BACKGROUND KNOWLEDGE; COLLABORATIVE WORK; CURRENT DEFINITION; DISTRIBUTED SOLUTIONS; OFFICE ENVIRONMENTS; PERVASIVE SPACE; PRIVACY REQUIREMENTS; UTILITY THEORY; BACK-GROUND KNOWLEDGE;

EID: 70549093007     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10445-9_13     Document Type: Conference Paper
Times cited : (12)

References (43)
  • 1
    • 70549090180 scopus 로고    scopus 로고
    • Likert scale. wikipedia, the free encyclopedia
    • Likert scale. wikipedia, the free encyclopedia
  • 2
    • 70549097280 scopus 로고    scopus 로고
    • Owl web ontology language guide February 2004
    • Owl web ontology language guide (February 2004)
  • 3
    • 70549087049 scopus 로고    scopus 로고
    • Swrl: A semantic web rule language combining owl and ruleml (May 2004)
    • Swrl: A semantic web rule language combining owl and ruleml (May 2004)
  • 4
    • 84869677460 scopus 로고    scopus 로고
    • Responsphere (2007), http://www.responsphere.org
    • (2007)
  • 5
    • 84869673174 scopus 로고    scopus 로고
    • RFID Tag lookup (2009), http://www.ics.uci.edu/community/events/ openhouse/rfid.php
    • (2009)
    • Tag lookup, R.F.I.D.1
  • 6
    • 84869688080 scopus 로고    scopus 로고
    • SAFIRE
    • SAFIRE (2009), http://www.ics.uci.edu/%7Eprojects/cert/verticals.html
    • (2009)
  • 7
    • 84869688081 scopus 로고    scopus 로고
    • SATrecorder (2009), http://www.ics.uci.edu/%7Eprojects/SATware
    • (2009)
    • SATrecorder1
  • 10
    • 0036360781 scopus 로고    scopus 로고
    • Routing through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
    • Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M., Yi, S.: Routing through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: ICDCS, vol. 22, pp. 74-83 (2002)
    • (2002) ICDCS , vol.22 , pp. 74-83
    • Al-Muhtadi, J.1    Campbell, R.2    Kapadia, A.3    Mickunas, M.4    Yi, S.5
  • 11
    • 77950855831 scopus 로고    scopus 로고
    • Situated privaces: Do you know where you mother (trucker) is?
    • Anderson, K., Dourish, P.: Situated privaces: Do you know where you mother (trucker) is? In: Proc. HCI International (2005)
    • (2005) Proc. HCI International
    • Anderson, K.1    Dourish, P.2
  • 12
    • 70549106629 scopus 로고    scopus 로고
    • Buffett, S., Fleming, M.: Applying a Preference Modeling Structure to User Privacy. NRC Publication Number: NRC 49372 (2007)
    • Buffett, S., Fleming, M.: Applying a Preference Modeling Structure to User Privacy. NRC Publication Number: NRC 49372 (2007)
  • 13
    • 30944434221 scopus 로고    scopus 로고
    • Monitoring streams - a new class of data management applications
    • Technical Report CS-02-04, Brown Computer Science February
    • Carney, D., Cetintemel, U., Cherniack, M., Convey, C., Lee, S., Seidman, G., Stone-braker, M., Tatbul, N., Zdonik, S.: Monitoring streams - a new class of data management applications. Technical Report CS-02-04, Brown Computer Science (February 2007)
    • (2007)
    • Carney, D.1    Cetintemel, U.2    Cherniack, M.3    Convey, C.4    Lee, S.5    Seidman, G.6    Stone-braker, M.7    Tatbul, N.8    Zdonik, S.9
  • 15
    • 70549112218 scopus 로고    scopus 로고
    • Corsar, D., Sleeman, D., McKenzie, A., Aberdeen, U.: Extending Jess to Handle Uncertainty. In: AI 2007. Springer, Heidelberg (2007)
    • Corsar, D., Sleeman, D., McKenzie, A., Aberdeen, U.: Extending Jess to Handle Uncertainty. In: AI 2007. Springer, Heidelberg (2007)
  • 18
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
    • Dwork, C., et al.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 19
    • 38149127774 scopus 로고
    • Rete: A fast algorithm for the many pattern/many object pattern match problem
    • Forgy, C.: Rete: a fast algorithm for the many pattern/many object pattern match problem. In: IEEE Computer Society Reprint Collection, pp. 324-341 (1991)
    • (1991) IEEE Computer Society Reprint Collection , pp. 324-341
    • Forgy, C.1
  • 22
    • 70349466549 scopus 로고    scopus 로고
    • Hore, B., Wickramasuriya, J., Mehrotra, S., Venkatasubramanian, N., Massaguer, D.: Privacy-preserving event detection in pervasive spaces. In: PerCom 2009 (2009)
    • Hore, B., Wickramasuriya, J., Mehrotra, S., Venkatasubramanian, N., Massaguer, D.: Privacy-preserving event detection in pervasive spaces. In: PerCom 2009 (2009)
  • 23
    • 38149035174 scopus 로고    scopus 로고
    • Hsieh, G., Tang, K., Low, W., Hong, J.: Field deployment of IMBuddy: A study of privacy control and feedback mechanisms for contextual IM. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, 4717, pp. 91-108. Springer, Heidelberg (2007)
    • Hsieh, G., Tang, K., Low, W., Hong, J.: Field deployment of IMBuddy: A study of privacy control and feedback mechanisms for contextual IM. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 91-108. Springer, Heidelberg (2007)
  • 24
    • 70549109265 scopus 로고
    • Getting. The global positioning system
    • Ivan, A.: Getting. The global positioning system. IEEE Spectrum 30(12), 36 (1993)
    • (1993) IEEE Spectrum , vol.30 , Issue.12 , pp. 36
    • Ivan, A.1
  • 25
    • 85027608326 scopus 로고    scopus 로고
    • Kifer, M., Li, A.: On the semantics of rule-based expert systems with uncertainty. In: Gyssens, M., Van Gucht, D., Paredaens, J. (eds.) ICDT 1988. LNCS, 326, pp. 102-117. Springer, Heidelberg (1988)
    • Kifer, M., Li, A.: On the semantics of rule-based expert systems with uncertainty. In: Gyssens, M., Van Gucht, D., Paredaens, J. (eds.) ICDT 1988. LNCS, vol. 326, pp. 102-117. Springer, Heidelberg (1988)
  • 26
    • 26444479778 scopus 로고
    • Optimization by Simulated Annealing
    • Kirkpatrick, S., Gelatt, C.D.J., Vecchi, M.P.: Optimization by Simulated Annealing. Science 220 (4598), 671-680 (1983)
    • (1983) Science , vol.220 , Issue.4598 , pp. 671-680
    • Kirkpatrick, S.1    Gelatt, C.D.J.2    Vecchi, M.P.3
  • 29
    • 70549101311 scopus 로고    scopus 로고
    • Machanavajjhala, A, Kifer, D, Gehrke, J, Venkitasubramaniam, M, l-Diversity: Privacy Beyond k-Anonymity
    • Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity
  • 30
    • 34548748619 scopus 로고    scopus 로고
    • Martin, D., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.: Worst-Case Background Knowledge for Privacy-Preserving Data Publishing. In: ICDE (2007)
    • Martin, D., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.: Worst-Case Background Knowledge for Privacy-Preserving Data Publishing. In: ICDE (2007)
  • 31
    • 70549110161 scopus 로고    scopus 로고
    • Massaguer, D., Balasubramanian, V., Mehrotra, S., Venkatasubramanian, N.: Multi-Agent Simulation of Disaster Response. In: ATDM-AAMAS 2006 (May 2006)
    • Massaguer, D., Balasubramanian, V., Mehrotra, S., Venkatasubramanian, N.: Multi-Agent Simulation of Disaster Response. In: ATDM-AAMAS 2006 (May 2006)
  • 33
    • 0034539094 scopus 로고    scopus 로고
    • The Cricket location-support system
    • ACM Press, New York
    • Priyantha, N., Chakraborty, A., Balakrishnan, H.: The Cricket location-support system. In: MobiComp, pp. 32-43. ACM Press, New York (2000)
    • (2000) MobiComp , pp. 32-43
    • Priyantha, N.1    Chakraborty, A.2    Balakrishnan, H.3
  • 35
    • 4344559647 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • Technical report
    • Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (1998) (Technical report)
    • (1998) Proceedings of the IEEE Symposium on Research in Security and Privacy
    • Samarati, P.1    Sweeney, L.2
  • 36
    • 1642267577 scopus 로고    scopus 로고
    • Schilit, B., LaMarca, A., Borriello, G., Griswold, W., McDonald, D., Lazowska, E., Balachandran, A., Hong, J., Iverson, V.: Challenge: ubiquitous location-aware computing and the place lab initiative. In: WMASH, pp. 29-35. ACM, New York (2003)
    • Schilit, B., LaMarca, A., Borriello, G., Griswold, W., McDonald, D., Lazowska, E., Balachandran, A., Hong, J., Iverson, V.: Challenge: ubiquitous location-aware computing and the" place lab" initiative. In: WMASH, pp. 29-35. ACM, New York (2003)
  • 37
    • 85150403715 scopus 로고    scopus 로고
    • Sweeney, L.: Achieving k-Anonymity Privacy Protection Using Generalization and Suppression. Int'l. journal of uncertainty fuzziness and knowledge based systems 10(5), 571-588 (2002)
    • Sweeney, L.: Achieving k-Anonymity Privacy Protection Using Generalization and Suppression. Int'l. journal of uncertainty fuzziness and knowledge based systems 10(5), 571-588 (2002)
  • 39
    • 0002322323 scopus 로고
    • The basic entity model: A Fundamental Theoretical Model of Information and Information Processing
    • Thow-Yick, L.: The basic entity model: A Fundamental Theoretical Model of Information and Information Processing. Information Processing and Management 30(5), 647-661 (1994)
    • (1994) Information Processing and Management , vol.30 , Issue.5 , pp. 647-661
    • Thow-Yick, L.1
  • 40
    • 0030196321 scopus 로고    scopus 로고
    • The basic entity model: A theoretical model of information processing, decision making and information systems
    • Thow-Yick, L.: The basic entity model: A theoretical model of information processing, decision making and information systems. Information Processing and Management 32(4), 477-487 (1996)
    • (1996) Information Processing and Management , vol.32 , Issue.4 , pp. 477-487
    • Thow-Yick, L.1
  • 41
    • 33845427407 scopus 로고    scopus 로고
    • Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: A semantic context-aware access control framework for secure collaborations in pervasive computing environments. In: Cruz, I., Decker, S., Allemang, D., Preist, C., Schwabe, D., Mika, P., Uschold, M., Aroyo, L.M. (eds.) ISWC 2006. LNCS, 4273, pp. 473-486. Springer, Heidelberg (2006)
    • Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: A semantic context-aware access control framework for secure collaborations in pervasive computing environments. In: Cruz, I., Decker, S., Allemang, D., Preist, C., Schwabe, D., Mika, P., Uschold, M., Aroyo, L.M. (eds.) ISWC 2006. LNCS, vol. 4273, pp. 473-486. Springer, Heidelberg (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.