-
1
-
-
84898043733
-
Charting past, present and future research in ubiquitous computing
-
Mar.
-
G. D. Abowd and E. Mynatt. Charting past, present and future research in ubiquitous computing. ACM Trans. on Computer-Human Interaction, Special issue on HCI in the new Millenium, 7(1):29-58, Mar. 2000.
-
(2000)
ACM Trans. on Computer-Human Interaction, Special Issue on HCI in the New Millenium
, vol.7
, Issue.1
, pp. 29-58
-
-
Abowd, G.D.1
Mynatt, E.2
-
5
-
-
79956045278
-
-
Available from CNN over the Internet, Oct.
-
CNN. 911 Caller Ignored, Killed. Available from CNN over the Internet, Oct. 2010. http://www.cnn.com/video/#/video/us/2008/05/02/.
-
(2010)
911 Caller Ignored, Killed
-
-
-
6
-
-
80053144839
-
-
P. C. I. Council. Available over the Internet - July
-
P. C. I. Council. Payment card industry (pci) data security standard. Available over the Internet - July 2010. https://www.pcisecuritystandards.org.
-
(2010)
Payment Card Industry (Pci) Data Security Standard
-
-
-
7
-
-
5444242493
-
A survey of policy specification approaches
-
Imperial College, London
-
N. Damianou, A. K. B, M. Sloman, and E. C. Lupu. A Survey of Policy Specification Approaches. Technical report, Department of Computing, Imperial College, London, 2002.
-
(2002)
Technical Report, Department of Computing
-
-
Damianou, N.1
B, A.K.2
Sloman, M.3
Lupu, E.C.4
-
8
-
-
0001809810
-
The ponder policy specification language
-
Bristol, U.K. Springer-Verlag, LNCS, Jan.
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. Policy Workshop 2001, Bristol, U.K., Springer-Verlag, LNCS, Jan. 2001.
-
(2001)
Policy Workshop 2001
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
9
-
-
4544341979
-
The last link: Default = offine, or why ubicomp scares me
-
Oct.
-
S. Doheny-Farina. The Last Link: Default = Offine, Or Why Ubicomp Scares Me. Computer-mediated Communication, 1(6):18-20, Oct. 1994.
-
(1994)
Computer-mediated Communication
, vol.1
, Issue.6
, pp. 18-20
-
-
Doheny-Farina, S.1
-
10
-
-
0002228676
-
Next century challenges: Data-centric networking for invisible computing
-
Seattle, WA
-
M. Esler, J. Hightower, T. Anderson, and G. Borriello. Next century challenges: Data-centric networking for invisible computing. In Proceedings of MobiComS99, Seattle, WA, 1999.
-
(1999)
Proceedings of MobiComS99
-
-
Esler, M.1
Hightower, J.2
Anderson, T.3
Borriello, G.4
-
12
-
-
4544226510
-
Why do people wear active badges?
-
Rank Xerox, Cambridge, MA
-
R. H. R. Harper. Why Do People Wear Active Badges? Technical Report EPC-1993-120, Rank Xerox, Cambridge, MA, 1993.
-
(1993)
Technical Report EPC-1993-120
-
-
Harper, R.H.R.1
-
13
-
-
77958580542
-
-
Available from Health and Human Services Department over the Internet - July
-
HHS. Hipaa privacy rule. Available from Health and Human Services Department over the Internet - July 2010. www.hhs.gov/ocr/privacy/hipaa/ administrative/privacyrule/index.html.
-
(2010)
Hipaa Privacy Rule
-
-
-
14
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing
-
New York
-
J. I. Hong and J. A. Landay. An architecture for Privacy-sensitive Ubiquitous Computing. In Proc. 2nd Inter'l Conference on Mobile Systems, Applications, and Services, pages 177-189, New York, 2004.
-
(2004)
Proc. 2nd Inter'l Conference on Mobile Systems, Applications, and Services
, pp. 177-189
-
-
Hong, J.I.1
Landay, J.A.2
-
15
-
-
84945556728
-
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
-
Ubicomp 2001: Ubiquitous Computing
-
M. Langheinrich. Privacy by Design - Principles of Privacy-aware Ubiquitous Systems. In Proc. Inter'l Conference on Ubiquitous Computing, pages 273-291, Gresham College, London, 2001. (Pubitemid 33347314)
-
(2001)
Lecture Notes in Computer Science
, Issue.2201
, pp. 273-291
-
-
Langheinrich, M.1
-
16
-
-
37249076243
-
Towards everyday privacy for ubiquitous computing
-
Berkeley
-
S. Lederer, J. Hong, X. Jiang, A. Dey, J. Landay, and J. Mankoff. Towards everyday privacy for ubiquitous computing. Tech.Report UCBCSD-03-1283, Computer Sc. Division, Univ. of California, Berkeley, 2003.
-
(2003)
Tech.Report UCBCSD-03-1283, Computer Sc. Division, Univ. of California
-
-
Lederer, S.1
Hong, J.2
Jiang, X.3
Dey, A.4
Landay, J.5
Mankoff, J.6
-
17
-
-
38149073252
-
Ninja: Non identity based, privacy preserving authentication for ubiquitous environments
-
LNCS-4717, Sept.
-
A. Leung and C. J. Mitchell. Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. UbiComp 2007: Ubiquitous Computing, Lecture Notes in Computer Science, LNCS-4717:73-90, Sept. 2007.
-
(2007)
UbiComp 2007: Ubiquitous Computing, Lecture Notes in Computer Science
, pp. 73-90
-
-
Leung, A.1
Mitchell, C.J.2
-
18
-
-
24944500638
-
An intelligent environment to support aging-in-place, safety, and independence of older adults with dementia
-
Seattle, WA
-
A. Mihailidis, B. Carmichael, J. Boger, and G. Fernie. An intelligent environment to support aging-in-place, safety, and independence of older adults with dementia. In Proc. 2nd Inter'l Workshop on Ubiquitous Computing for Pervasive Healthcare Applications (UbiHealth-2003), Seattle, WA, 2003.
-
(2003)
Proc. 2nd Inter'l Workshop on Ubiquitous Computing for Pervasive Healthcare Applications (UbiHealth-2003)
-
-
Mihailidis, A.1
Carmichael, B.2
Boger, J.3
Fernie, G.4
-
19
-
-
33747329910
-
Threat modeling as a basis for security requirements
-
Paris, France, Aug.
-
S. Myagmar, A. Lee, and W. Yurcik. Threat Modeling as a Basis for Security Requirements. In Proc. of the Symposium on Requirements Engineering for Info. Security (SREIS'05), Paris, France, Aug. 2005.
-
(2005)
Proc. of the Symposium on Requirements Engineering for Info. Security (SREIS'05)
-
-
Myagmar, S.1
Lee, A.2
Yurcik, W.3
-
20
-
-
38049161526
-
Security threat modeling and analysis: A goal-oriented approach
-
Dallas, USA, Nov.
-
E. Oladimeji, S. Supakkul, and L. Chung. Security Threat Modeling and Analysis: A Goal-Oriented Approach. In Proc. of the 10th IASTED International Conference on Software Engineering and Applications (SEA 2006), pages 13-15, Dallas, USA, Nov. 2006.
-
(2006)
Proc. of the 10th IASTED International Conference on Software Engineering and Applications (SEA 2006)
, pp. 13-15
-
-
Oladimeji, E.1
Supakkul, S.2
Chung, L.3
-
21
-
-
60849113797
-
A model-driven approach to architecting secure software
-
Boston, USA, July
-
E. Oladimeji, S. Supakkul, and L. Chung. A Model-driven Approach to Architecting Secure Software. In The 19th International Conference on Software Engineering and Knowledge Engineering (SEKE'07), pages 535-540, Boston, USA, July 2007.
-
(2007)
The 19th International Conference on Software Engineering and Knowledge Engineering (SEKE'07)
, pp. 535-540
-
-
Oladimeji, E.1
Supakkul, S.2
Chung, L.3
-
22
-
-
84885042601
-
Security and privacy in the age of ubiquitous computing
-
Chiba, Japan
-
R. Sasaki, S. Qing, E. Okamoto, and H. Yoshiura. Security and Privacy in the Age of Ubiquitous Computing. In Proc. IFIP TC11 20th Inter'l Information Security Conference, Chiba, Japan, 2005.
-
(2005)
Proc. IFIP TC11 20th Inter'l Information Security Conference
-
-
Sasaki, R.1
Qing, S.2
Okamoto, E.3
Yoshiura, H.4
-
24
-
-
79956044854
-
Security issues in ubiquitous computing
-
H. Nakashima, H. Aghajan, J. C. Augusto (Eds.), Springer
-
F. Stajano. Security Issues in Ubiquitous Computing. In H. Nakashima, H. Aghajan, J. C. Augusto (Eds.). Handbook of Ambient Intelligence and Smart Environments, Springer 2010.
-
(2010)
Handbook of Ambient Intelligence and Smart Environments
-
-
Stajano, F.1
-
25
-
-
0041595778
-
Pervasive health care applications face tough security challenges
-
April-June
-
V. Stanford. Pervasive Health Care Applications Face Tough Security Challenges. IEEE Pervasive Computing, 8(12), April-June 2002.
-
(2002)
IEEE Pervasive Computing
, vol.8
, Issue.12
-
-
Stanford, V.1
-
26
-
-
72949123722
-
Extending problem frames to deal with stakeholder problems: An agent- and goal-oriented approach
-
Honolulu, Hawai, Mar. 9-12
-
S. Supakkul and L. Chung. Extending Problem Frames to Deal with Stakeholder Problems: An Agent- and Goal-Oriented Approach. In Proc. of the 24th ACM Symposium on Applied Computing (RE Track), pages 389-394, Honolulu, Hawai, Mar. 9-12 2006.
-
(2006)
Proc. of the 24th ACM Symposium on Applied Computing (RE Track)
, pp. 389-394
-
-
Supakkul, S.1
Chung, L.2
-
28
-
-
33646711912
-
Security aspects of ubiquitous computing in health care
-
DOI 10.1007/s00502-006-0336
-
E. Weippl, A. Holzinger, and A. Tjoa. Security Aspects of Ubiquitous Computing in Health Care. E&I Journal, pages 156-161, 2006. (Pubitemid 43734490)
-
(2006)
Elektrotechnik und Informationstechnik
, vol.123
, Issue.4
, pp. 156-161
-
-
Weippl, E.1
Holzinger, A.2
Tjoa, A.M.3
-
29
-
-
84942211371
-
Hot topics: Ubiquitous computing
-
Oct.
-
M. Weiser. Hot Topics: Ubiquitous Computing. IEEE Computer, pages 71-72, Oct. 1993.
-
(1993)
IEEE Computer
, pp. 71-72
-
-
Weiser, M.1
|