메뉴 건너뛰기




Volumn , Issue , 2009, Pages 425-431

Privacy-friendly smart environments

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS CREDENTIAL; COMPUTATIONAL UNITS; IDENTITY MANAGEMENT; INFORMATION DISCLOSURE; PERSONAL INFORMATION; SMART ENVIRONMENT; SMART HOMES; USER PRIVACY;

EID: 74049140815     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NGMAST.2009.23     Document Type: Conference Paper
Times cited : (6)

References (18)
  • 3
    • 33749665781 scopus 로고    scopus 로고
    • A Technical Overview of Digital Credentials
    • Credentica, Tech. Rep
    • S. Brands, "A Technical Overview of Digital Credentials," Credentica, Tech. Rep., 2002.
    • (2002)
    • Brands, S.1
  • 6
    • 45749143221 scopus 로고    scopus 로고
    • th IFIP WG 6.1 International Conference (DAIS 2008), ser. LNCS, R. Meier and S. Terzis, Eds., 5053. Springer, 2008, pp. 154-167.
    • th IFIP WG 6.1 International Conference (DAIS 2008), ser. LNCS, R. Meier and S. Terzis, Eds., vol. 5053. Springer, 2008, pp. 154-167.
  • 9
    • 74049086962 scopus 로고    scopus 로고
    • Legion of the Bouncy Castle, Bouncy Castle Crypto APIs, http://www.bouncycastle.org/java.html, 2009.
    • Legion of the Bouncy Castle, "Bouncy Castle Crypto APIs," http://www.bouncycastle.org/java.html, 2009.
  • 10
    • 84937411601 scopus 로고    scopus 로고
    • A Privacy Awareness System for Ubiquitous Computing Environments
    • UbiComp '02: Proceedings of the 4th international conference on Ubiquitous Computing, Springer-Verlag
    • M. Langheinrich, "A Privacy Awareness System for Ubiquitous Computing Environments," in UbiComp '02: Proceedings of the 4th international conference on Ubiquitous Computing, ser. LNCS, vol. 2498. Springer-Verlag, 2002, pp. 237-245.
    • (2002) ser. LNCS , vol.2498 , pp. 237-245
    • Langheinrich, M.1
  • 11
    • 24644520728 scopus 로고    scopus 로고
    • Towards Security and Privacy for Pervasive Computing
    • Software Security, Theories and Systems
    • R. Campbell, J. Al-Muhtadi, P. Naldurg, G. Sampemane, and M. D. Mickunas, "Towards Security and Privacy for Pervasive Computing," in Software Security - Theories and Systems, ser. LNCS, vol. 2609, 2003, pp. 1-15.
    • (2003) ser. LNCS , vol.2609 , pp. 1-15
    • Campbell, R.1    Al-Muhtadi, J.2    Naldurg, P.3    Sampemane, G.4    Mickunas, M.D.5
  • 15
    • 57149109843 scopus 로고    scopus 로고
    • a. P. Sousa, Jo Challenges and Architectural Approaches for Authenticating Mobile Users, in SAM '08: Proceedings of the 1st International Workshop on Software Architectures and Mobility. ACM, 2008, pp. 15-20.
    • a. P. Sousa, Jo "Challenges and Architectural Approaches for Authenticating Mobile Users," in SAM '08: Proceedings of the 1st International Workshop on Software Architectures and Mobility. ACM, 2008, pp. 15-20.
  • 16
    • 35048814020 scopus 로고    scopus 로고
    • Privacy Protection in Ubiquitous Computing Based on Privacy Label and Information Flow
    • Computational Science and Its Applications, ICCSA 2004, Springer
    • S. O. Hwang and K. S. Yoon, "Privacy Protection in Ubiquitous Computing Based on Privacy Label and Information Flow," in Computational Science and Its Applications - (ICCSA 2004 ), ser. LNCS, vol. 3044. Springer, 2004, pp. 46-54.
    • (2004) ser. LNCS , vol.3044 , pp. 46-54
    • Hwang, S.O.1    Yoon, K.S.2
  • 17
    • 33745888870 scopus 로고    scopus 로고
    • Survey on Location Privacy in Pervasive Computing
    • Privacy, Security and Trust within the Context of Pervasive Computing, Springer
    • A. Görlach, A. Heinemann, and W. W. Terpstra, "Survey on Location Privacy in Pervasive Computing," in Privacy, Security and Trust within the Context of Pervasive Computing, ser. The International Series in Engineering and Computer Science. Springer, 2004, pp. 23-34.
    • (2004) ser. The International Series in Engineering and Computer Science , pp. 23-34
    • Görlach, A.1    Heinemann, A.2    Terpstra, W.W.3
  • 18
    • 84938704593 scopus 로고    scopus 로고
    • Enabling privacy in pervasive computing using fusion of privacy negotiation, identity management and trust management techniques
    • IEEE Computer Society
    • A. J. Blazic, K. Dolinar, and J. Porekar, "Enabling privacy in pervasive computing using fusion of privacy negotiation, identity management and trust management techniques," in ICDS '07: Proceedings of the First International Conference on the Digital Society. IEEE Computer Society, 2007, p. 30.
    • (2007) ICDS '07: Proceedings of the First International Conference on the Digital Society , pp. 30
    • Blazic, A.J.1    Dolinar, K.2    Porekar, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.