메뉴 건너뛰기




Volumn , Issue , 2010, Pages 41-48

Preserve your privacy with PCO: A privacy sensitive architecture for context obfuscation for pervasive E-community based applications

Author keywords

Context; E community; Granularity; Privacy

Indexed keywords

CONTEXT; CONTEXT OBFUSCATION; CONTEXT- AWARENESS; CONTEXTUAL INFORMATION; E-COMMUNITY; GRANULARITY; INSTANT MESSAGING; MULTIPLE LEVELS; NETWORKED DEVICES; ONLINE COMMUNITIES; PERVASIVE APPLICATIONS; PERVASIVE ENVIRONMENTS; PRIVACY; PRIVACY PRESERVATION; USER EVALUATIONS;

EID: 78649255885     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SocialCom.2010.16     Document Type: Conference Paper
Times cited : (13)

References (35)
  • 1
    • 0036360781 scopus 로고    scopus 로고
    • Routing through the mist: Privacy preserving communication in ubiquitous computing environments
    • J. A. Muhtadi, R. H. Campbell, A. Kapadia, M. D. Mickunas, and S. Yi, "Routing through the mist: privacy preserving communication in ubiquitous computing environments," In Proc. ICDCS 2002, pp. 74-83, 2002.
    • (2002) Proc. ICDCS 2002 , pp. 74-83
    • Muhtadi, J.A.1    Campbell, R.H.2    Kapadia, A.3    Mickunas, M.D.4    Yi, S.5
  • 4
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Ed 1
    • A. R. Beresford, and F. Stajano, "Location privacy in pervasive computing," In IEEE Pervasive Comp., Vol 2, Ed 1, pp. 46-55, 2003.
    • (2003) IEEE Pervasive Comp. , vol.2 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 6
    • 24744468399 scopus 로고    scopus 로고
    • Protection of privacy in pervasive computing environments
    • H. S. Cheng, D. Zhang, and J. G. Tan, "Protection of privacy in pervasive computing environments," In Proc. ITCC 2005, pp. 242-247, 2005.
    • (2005) Proc. ITCC 2005 , pp. 242-247
    • Cheng, H.S.1    Zhang, D.2    Tan, J.G.3
  • 8
    • 0033346164 scopus 로고    scopus 로고
    • The conference assistant: Combining context-awareness with wearable computing
    • A. K. Dey, M. Futakawa, D. Salber, , and G. D. Abowd, "The conference assistant: combining context-awareness with wearable computing," In Proc. ISWC 1999, pp. 21-28, 1999.
    • (1999) Proc. ISWC 1999 , pp. 21-28
    • Dey, A.K.1    Futakawa, M.2    Salber, D.3    Abowd, G.D.4
  • 9
    • 0242308057 scopus 로고    scopus 로고
    • A semantic e-wallet to reconcile privacy and context awareness
    • F. Gandon, and N. M. Sadeh, "A semantic e-wallet to reconcile privacy and context awareness," In Proc. ISWC 2003, pp. 385-401, 2003.
    • (2003) Proc. ISWC 2003 , pp. 385-401
    • Gandon, F.1    Sadeh, N.M.2
  • 10
    • 0037481692 scopus 로고    scopus 로고
    • Instant messaging in teen life
    • R.E. Grinter, and L. Palen, "Instant messaging in teen life," In Proc. CSCW 2002, pp. 21-30, 2002.
    • (2002) Proc. CSCW 2002 , pp. 21-30
    • Grinter, R.E.1    Palen, L.2
  • 11
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • USENIX Association
    • M. Gruteser, and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," In Proc. MobiSys 2003, USENIX Association, pp. 31-42, 2003.
    • (2003) Proc. MobiSys 2003 , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2
  • 13
    • 4544259863 scopus 로고    scopus 로고
    • An architecture for privacy-sensitive ubiquitous computing
    • J. Hong, and J. A. Landay, "An architecture for privacy-sensitive ubiquitous computing," In Proc. MobiSys 2004, pp. 177-189, 2004.
    • (2004) Proc. MobiSys 2004 , pp. 177-189
    • Hong, J.1    Landay, J.A.2
  • 14
    • 10044248787 scopus 로고    scopus 로고
    • Privacy risk models for designing privacy-sensitive ubiquitous computing systems
    • J. Hong, S. Lederer, J. Landay, "Privacy risk models for designing privacy-sensitive ubiquitous computing systems," In Proc. DIS 2004, pp. 91-100, 2004.
    • (2004) Proc. DIS 2004 , pp. 91-100
    • Hong, J.1    Lederer, S.2    Landay, J.3
  • 15
    • 38149035174 scopus 로고    scopus 로고
    • Field deployment of 'imbuddy': A study of privacy control and feedback mechanisms for contextual IM
    • G. Hsieh, K.P. Tang, W.Y. Low, and J.I. Hong, "Field deployment of 'imbuddy': a study of privacy control and feedback mechanisms for contextual IM," In Proc. UbiComp 2007, pp. 91-108, 2007.
    • (2007) Proc. UbiComp 2007 , pp. 91-108
    • Hsieh, G.1    Tang, K.P.2    Low, W.Y.3    Hong, J.I.4
  • 17
    • 2942731250 scopus 로고    scopus 로고
    • Emotion recognition system using short-term monitoring of physiological signals
    • Ed 3
    • K. H. Kim, S. W. Bang, and S. R. Kim, "Emotion recognition system using short-term monitoring of physiological signals," In Medical and Biological Engineering and Computing, Vol 42, Ed 3, pp. 419-427, 2004.
    • (2004) Medical and Biological Engineering and Computing , vol.42 , pp. 419-427
    • Kim, K.H.1    Bang, S.W.2    Kim, S.R.3
  • 18
    • 84869078915 scopus 로고    scopus 로고
    • Who wants to know what when? privacy preference determinants in ubiquitous computing
    • S. Lederer, J. Mankoff, and A. K. Dey, "Who wants to know what when? privacy preference determinants in ubiquitous computing," In Proc. CHI 2003, pp. 724-725, 2003.
    • (2003) Proc. CHI 2003 , pp. 724-725
    • Lederer, S.1    Mankoff, J.2    Dey, A.K.3
  • 19
    • 84958977900 scopus 로고    scopus 로고
    • Location-aware information delivery with ComMotion
    • N. Marmasse, and C. Schmandt, "Location-aware information delivery with ComMotion," In Proc. HUC 2000, pp. 157-171, 2000.
    • (2000) Proc. HUC 2000 , pp. 157-171
    • Marmasse, N.1    Schmandt, C.2
  • 20
    • 34547720006 scopus 로고    scopus 로고
    • The new casper: Query processing for location services without compromising privacy
    • M. F. Mokbel, C. Chow, and W. G. Aref, "The new casper: query processing for location services without compromising privacy," In Proc. of VLDB 2006, pp. 763-774, 2006.
    • (2006) Proc. of VLDB 2006 , pp. 763-774
    • Mokbel, M.F.1    Chow, C.2    Aref, W.G.3
  • 22
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • G. Myles, A. Friday, and N. Davies, "Preserving privacy in environments with location-based applications," In IEEE Pervasive Comp. 2, pp. 56-64, 2003.
    • (2003) IEEE Pervasive Comp. , vol.2 , pp. 56-64
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 23
    • 49149086781 scopus 로고    scopus 로고
    • Protecting user anonymity in pervasive computing environments
    • L. Pareschi, D. Riboni, and C. Bettini, "Protecting user anonymity in pervasive computing environments," In Proc. PerCom 08, pp. 11-19, 2008.
    • (2008) Proc. PerCom 08 , pp. 11-19
    • Pareschi, L.1    Riboni, D.2    Bettini, C.3
  • 24
    • 49149123423 scopus 로고    scopus 로고
    • Composition and generalization of context data for privacy preservation
    • L. Pareschi, D. Riboni, A. Agostini, and C. Bettini, "Composition and generalization of context data for privacy preservation," In Proc. Percom 2008, pp. 429-433, 2008.
    • (2008) Proc. Percom 2008 , pp. 429-433
    • Pareschi, L.1    Riboni, D.2    Agostini, A.3    Bettini, C.4
  • 25
    • 54949148734 scopus 로고    scopus 로고
    • Challenges and lessons in developing middleware on smart phones
    • Ed 10
    • O. Riva, and J. Kangasharju, "Challenges and lessons in developing middleware on smart phones," In Computer Magazine, Vol 41, Ed 10, pp. 23-31, 2008.
    • (2008) Computer Magazine , vol.41 , pp. 23-31
    • Riva, O.1    Kangasharju, J.2
  • 26
    • 0032670348 scopus 로고    scopus 로고
    • The context toolkit: Aiding the development of context-enabled applications
    • D. Salber, A. K. Dey, and G. D. Abowd, "The context toolkit: aiding the development of context-enabled applications," In Proc. CHI 1999, pp. 434-441, 1999.
    • (1999) Proc. CHI 1999 , pp. 434-441
    • Salber, D.1    Dey, A.K.2    Abowd, G.D.3
  • 28
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • Ed 6
    • L. Sweeney, "Achieving k-anonymity privacy protection using generalization and suppression," In Int. Journal Uncertain. Fuzz, Vol 10, Ed 6, pp. 571-588, 2002.
    • (2002) Int. Journal Uncertain. Fuzz , vol.10 , pp. 571-588
    • Sweeney, L.1
  • 29
    • 51949109614 scopus 로고    scopus 로고
    • FPCS: A formal approach for privacy-aware context-based services
    • N. Talukder, and S. I. Ahamed, "FPCS: a formal approach for privacy-aware context-based services," In Proc. COMPSAC 08, pp. 432-439, 2008.
    • (2008) Proc. COMPSAC 08 , pp. 432-439
    • Talukder, N.1    Ahamed, S.I.2
  • 31
    • 84976653144 scopus 로고    scopus 로고
    • Some computer science problems in ubiquitious computing
    • Ed 7, 199
    • M. Weiser, "Some computer science problems in ubiquitious computing," In Comm. of the ACM, Vol 36, Ed 7, pp. 75-84, 199.
    • Comm. of the ACM , vol.36 , pp. 75-84
    • Weiser, M.1
  • 33
    • 33644587121 scopus 로고    scopus 로고
    • Preserving mobile customer privacy: An access control system for moving objects and customer profiles
    • M. Youssef, V. Atluri, and N. R. Adam, "Preserving mobile customer privacy: an access control system for moving objects and customer profiles," In proc. MDM 2005, pp. 67-76, 2005.
    • (2005) Proc. MDM 2005 , pp. 67-76
    • Youssef, M.1    Atluri, V.2    Adam, N.R.3
  • 34
  • 35
    • 78649259851 scopus 로고    scopus 로고
    • XMMP Protocol, http://xmpp.org/protocols/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.