-
1
-
-
0036360781
-
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
-
In, Vienna, Austria
-
Al-Muhtadi, J., Campell, R., Kapadia, A., Mickunas, M., & Yi, S. (2002). Routing Through the Mist: Privacy Preserving Communication In Ubiquitous Computing Environments. In Proceedings of the International Conference of Distributed Computing Systems (ICDCS 2002), Vienna, Austria (pp. 65-74).
-
(2002)
Proceedings of the International Conference of Distributed Computing Systems (ICDCS 2002)
, pp. 65-74
-
-
Al-Muhtadi, J.1
Campell, R.2
Kapadia, A.3
Mickunas, M.4
Yi, S.5
-
2
-
-
33750328371
-
Developing a model for trust management in pervasive devices
-
In, Italy
-
Almenarez, F., Marin, A., Diaz, D., & Sanchez, J. (2006). Developing a Model for Trust Management in Pervasive Devices. In Proceeding of the fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM'06), Italy (pp. 267-271).
-
(2006)
Proceeding of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM'06)
, pp. 267-271
-
-
Almenarez, F.1
Marin, A.2
Diaz, D.3
Sanchez, J.4
-
3
-
-
0006364798
-
Design for privacy in multimedia computing and communications environments
-
In
-
Bellotti, V. (1997). Design for Privacy in Multimedia Computing and Communications Environments. In Technology and Privacy: The New Landscape (pp. 63-98).
-
(1997)
Technology and Privacy: The New Landscape
, pp. 63-98
-
-
Bellotti, V.1
-
6
-
-
3142676730
-
Trust-X: A peer to peer framework for trust establishment
-
doi:10.1109/TKDE.2004.1318565
-
Bertino, E., Ferrari, E., & Squicciarini, A. (2004b). Trust-X: A Peer to Peer Framework for Trust Establishment. IEEE Transactions on Knowledge and Data Engineering, 16(7), 827-842. doi:10.1109/TKDE.2004.1318565
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.3
-
7
-
-
33646886776
-
Secure knowledge management: Confidentiality, trust, and privacy
-
Bertino, E., Khan, L., Sandhu, R., & Thuraisingham, B. (2006). Secure Knowledge Management: Confidentiality, Trust, and Privacy. IEEE Transactions on Systems, Man, and Cybernetics. Systems and Humans, 36(3), 429-438.
-
(2006)
IEEE Transactions on Systems, Man, and Cybernetics. Systems and Humans
, vol.36
, Issue.3
, pp. 429-438
-
-
Bertino, E.1
Khan, L.2
Sandhu, R.3
Thuraisingham, B.4
-
9
-
-
0003812906
-
-
Singapore, World Scientific
-
Bojadziev, G., & Bojadziev, M. (1997). Fuzzy Logic for Business, Finance, and Management. Singapore: World Scientific.
-
(1997)
Fuzzy Logic for Business, Finance, and Management
-
-
Bojadziev, G.1
Bojadziev, M.2
-
11
-
-
2442446612
-
Towards security and privacy for pervasive computing
-
In, Tokyo, Japan
-
Campbell, R., Al-Muhtadi, J., Nadldurg, P., Sampemane, G., & Mickunas, M. (2002). Towards Security and Privacy for Pervasive Computing. In Proceedings of the ISSS, Tokyo, Japan (pp. 1-15).
-
(2002)
Proceedings of the ISSS
, pp. 1-15
-
-
Campbell, R.1
Al-Muhtadi, J.2
Nadldurg, P.3
Sampemane, G.4
Mickunas, M.5
-
13
-
-
0032732449
-
What are ontologies, and why do we need them?
-
doi:10.1109/5254.747902
-
Chandrasekaran, B., Josephson, J., & Benjamins, V. (1999). What are ontologies, and why do we need them? IEEE Intelligent Systems and Applications, 14, 20-26. doi:10.1109/5254.747902
-
(1999)
IEEE Intelligent Systems and Applications
, vol.14
, pp. 20-26
-
-
Chandrasekaran, B.1
Josephson, J.2
Benjamins, V.3
-
15
-
-
0035791053
-
Securing context-aware applications using environments roles
-
In
-
Covington, M., Long, W., Srinivasan, S., Dey, A., Ahamad, M., & Abowd, D. G. (2001). Securing Context-Aware Applications Using Environments Roles. In Proceedings of the sixth ACM Symposium on Access Controls Models and Technologies (pp. 10-20).
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Controls Models and Technologies
, pp. 10-20
-
-
Covington, M.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, D.G.6
-
18
-
-
84900830868
-
Understanding and using context
-
Retrieved February 23, 2009, from
-
Dey, A. K. (2001). Understanding and using context. Personal and Ubiquitous Computing Journal, 5(1), 4-7. Retrieved February 23, 2009, from http://www.cc.gatech.edu/fce/ctk/pubs/PeTe5-1.pdf
-
(2001)
Personal and Ubiquitous Computing Journal
, vol.5
, Issue.1
, pp. 4-7
-
-
Dey, A.K.1
-
19
-
-
0003461406
-
Towards a better understanding of context and contextawareness
-
The Hague, The Netherlands. Retrieved January 8, 2009, from ftp://ftp. cc.gatech.edu/pub/gvu/tr/1999/92-22.pdf
-
Dey, A. K., & Abowd, G. D. (2000). Towards a better understanding of context and contextawareness. The Proceedings of the CHI 2000 Workshop on the What, Who, when, and How of Context-Awareness, The Hague, The Netherlands. Retrieved January 8, 2009, from ftp://ftp. cc.gatech.edu/pub/gvu/tr/1999/92-22.pdf
-
(2000)
The Proceedings of the CHI 2000 Workshop on the What, Who, When, and How of Context-Awareness
-
-
Dey, A.K.1
Abowd, G.D.2
-
22
-
-
33749059586
-
Dynamic trust metrics for peer-to-peer systems
-
In
-
Duma, C., Shahmehri, N., & Caronni, G. (2005). Dynamic Trust Metrics for Peer-to-Peer Systems. In Proc. of the 2nd IEEE Workshop on P2P Data Management, Security and Trust.
-
(2005)
Proc. of the 2nd IEEE Workshop on P2P Data Management, Security and Trust
-
-
Duma, C.1
Shahmehri, N.2
Caronni, G.3
-
23
-
-
84863254921
-
Dynamic trust models for ubiquitous computing environments
-
In, Goteborg, Sweden
-
English, C., Nixon, P., Terzis, S., McGettrick, A., & Lowe, H. (2002). Dynamic Trust Models for Ubiquitous Computing Environments. In Proceedings of the UBICOMP2002-Workshop on Security in Ubiquitous Computing, Goteborg, Sweden.
-
(2002)
Proceedings of the UBICOMP2002-Workshop on Security in Ubiquitous Computing
-
-
English, C.1
Nixon, P.2
Terzis, S.3
McGettrick, A.4
Lowe, H.5
-
26
-
-
0002971942
-
Ontology-applications and design
-
doi:10.1145/503124.503146
-
Gruninger, M., & Lee, J. (2002). Ontology-Applications and Design. Communications of the ACM, 45(2), 39-65. doi:10.1145/503124.503146
-
(2002)
Communications of the ACM
, vol.45
, Issue.2
, pp. 39-65
-
-
Gruninger, M.1
Lee, J.2
-
27
-
-
2542616812
-
Quest for personal control over mobile location privacy
-
doi:10.1109/MCOM.2004.1299356
-
He, Q., Wu, L., & Khosla, P. (2004). Quest for Personal Control over Mobile Location Privacy. IEEE Communications Magazine, 42(5), 130-136. doi:10.1109/MCOM.2004.1299356
-
(2004)
IEEE Communications Magazine
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
Wu, L.2
Khosla, P.3
-
29
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
In
-
Herzberg, A., Mass, Y., & Michaeli, J. (2000). Access Control Meets Public Key Infrastructure, or: Assigning Roles to Strangers. In Proceedings of the 2000 IEEE Symposium on Security and Privacy (pp. 2-14).
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
-
31
-
-
2342620647
-
Enabling context-aware and privacy-conscious user data sharing
-
In
-
Hull, R., Kumar, B., Lieuwen, D., Patel-Schneider, P. F., Shuguet, A., Varadarajan, S., & Vyas, A. (2004). Enabling Context-Aware and Privacy-Conscious User Data Sharing. In Proc. of the 2004 IEEE International Conference on Mobile Data Management (pp.187-198).
-
(2004)
Proc. of the 2004 IEEE International Conference on Mobile Data Management
, pp. 187-198
-
-
Hull, R.1
Kumar, B.2
Lieuwen, D.3
Patel-Schneider, P.F.4
Shuguet, A.5
Varadarajan, S.6
Vyas, A.7
-
33
-
-
46449120864
-
Pervasive privacy with identity management
-
In
-
Jendricke, U., Kreutzer, M., & Zugenmair, A. (2002). Pervasive Privacy with Identity Management. In Proceedings of the 1st Workshop Security, UbiComp.
-
(2002)
Proceedings of the 1st Workshop Security, UbiComp
-
-
Jendricke, U.1
Kreutzer, M.2
Zugenmair, A.3
-
34
-
-
2442557513
-
Modeling privacy control in context-aware systems
-
doi:10.1109/MPRV.2002.1037723
-
Jiang, X., & Landay, J. A. (2002). Modeling Privacy Control in Context-Aware Systems. Pervasive Computing, 1(3), 59-63. doi:10.1109/MPRV.2002.1037723
-
(2002)
Pervasive Computing
, vol.1
, Issue.3
, pp. 59-63
-
-
Jiang, X.1
Landay, J.A.2
-
35
-
-
0035577649
-
Trusted-based secuirty in pervasive computing environments
-
Kagal, L., Finin, T., & Joshi, A. (2001). Trusted-based Secuirty in Pervasive Computing Environments. IEEE Computer Society Press, 34(12), 154-157.
-
(2001)
IEEE Computer Society Press
, vol.34
, Issue.12
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
36
-
-
13244261637
-
Vigil: Enforcing security in ubiquitous environments
-
In
-
Kagal, L., Undercoffer, J., Perich, F., Joshi, A., & Finin, T. (2002). Vigil: Enforcing Security in Ubiquitous Environments. In Proceedings of the Grace Hopper Celebration of Women in Computing 2002.
-
(2002)
Proceedings of the Grace Hopper Celebration of Women in Computing 2002
-
-
Kagal, L.1
Undercoffer, J.2
Perich, F.3
Joshi, A.4
Finin, T.5
-
37
-
-
7644231825
-
A security architecture based on trust management for pervasive computing
-
In
-
Kagal, L., Undercoffer, J., Perich, F., Joshi, A., & Finin, T. (2002). A Security Architecture Based on Trust Management for Pervasive Computing. In Proceeding of the Grace Hopper Celebration of Women in Computing.
-
(2002)
Proceeding of the Grace Hopper Celebration of Women in Computing
-
-
Kagal, L.1
Undercoffer, J.2
Perich, F.3
Joshi, A.4
Finin, T.5
-
38
-
-
38049003038
-
Virtual walls: Protecting digital privacy in pervasive environments
-
In, Berlin, Germany: Springer-Verlag
-
Kapadia, A., Henderson, T., Fielding, J. J., & Kotz, D. (2007). Virtual Walls: Protecting Digital Privacy in Pervasive Environments. In Proceedings of the Fifth International Conference on Pervasive Computing (Pervasive) (pp. 162-179). Berlin, Germany: Springer-Verlag.
-
(2007)
Proceedings of the Fifth International Conference on Pervasive Computing (Pervasive)
, pp. 162-179
-
-
Kapadia, A.1
Henderson, T.2
Fielding, J.J.3
Kotz, D.4
-
45
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
Li, N., Winsborough, W., & Mitchell, J. (2003). Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security, 11(1), 35-86.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
48
-
-
67650083441
-
Attribute trust-a framework for evaluating trust in aggregated attributes via a reputation system
-
In, Washington, DC: IEEE Computer Society Press
-
th Annual Conference on Privacy, Security and Trust (pp. 201-212). Washington, DC: IEEE Computer Society Press.
-
(2008)
th Annual Conference on Privacy, Security and Trust
, pp. 201-212
-
-
Mohan, A.1
Blough, M.2
-
49
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
doi:10.1109/MPRV.2003.1186726
-
Myles, G., Friday, A., & Davies, N. (2003). Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing / IEEE Computer Society [and] IEEE Communications Society, 2(1), 56-64. doi:10.1109/MPRV.2003.1186726
-
(2003)
IEEE Pervasive Computing / IEEE Computer Society [and] IEEE Communications Society
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
52
-
-
0004198635
-
-
Upper Saddle River, NJ, Prentice-Hall, Inc
-
Pfleeger, P. C. (1997). Security in Computing. Upper Saddle River, NJ: Prentice-Hall, Inc.
-
(1997)
Security in Computing
-
-
Pfleeger, P.C.1
-
54
-
-
33846266235
-
Trust model for open ubiquitous agent systems
-
In, Compiegne University of Technology, France
-
Rehak, M., Foltyn, M., Pechoucek, M., & Benda, P. (2005). Trust Model for Open Ubiquitous agent systems. In Proceedings of the IEEE/WIC/ACM/ International Conference on Intelligent Agent Technology (IAT), Compiegne University of Technology, France (pp. 536-542).
-
(2005)
Proceedings of the IEEE/WIC/ACM/ International Conference on Intelligent Agent Technology (IAT)
, pp. 536-542
-
-
Rehak, M.1
Foltyn, M.2
Pechoucek, M.3
Benda, P.4
-
56
-
-
33846307093
-
Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability
-
doi:10.1007/s11036-006-0008-7
-
Ren, K., & Lou, W. (2007). Privacy-Enhanced, Attack-Resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. Mobile Networks and Applications, 12(1), 79-92. doi:10.1007/s11036-006-0008-7
-
(2007)
Mobile Networks and Applications
, vol.12
, Issue.1
, pp. 79-92
-
-
Ren, K.1
Lou, W.2
-
57
-
-
33746373934
-
A novel privacy preserving authentication and access control scheme for pervasive computing environments
-
doi:10.1109/TVT.2006.877704
-
Ren, K., Lou, W., Kim, K., & Deng, R. (2006). A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 55(4), 1373-1384. doi:10.1109/TVT.2006.877704
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.4
, pp. 1373-1384
-
-
Ren, K.1
Lou, W.2
Kim, K.3
Deng, R.4
-
61
-
-
85056545124
-
Limiting the disclosure of access control policies during automated trust negotiation
-
In, San Diego, CA
-
Seamons, K. E., Winslett, M., & Yu, T. (2001). Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation. In Proceedings of the Network and Distributed System Security Symposium, San Diego, CA.
-
(2001)
Proceedings of the Network and Distributed System Security Symposium
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
-
64
-
-
34547505017
-
PP-trust-x: A system for privacy preserving trust negotiations. [TISSEC]
-
doi:10.1145/1266977.1266981
-
Squicciarini, A., Bertino, E., Ferrari, E., Paci, F., & Thuraisinghm, B. (2007). PP-Trust-X: A system for Privacy Preserving Trust Negotiations. [TISSEC]. ACM Transactions on Information and System Security, 10(3). doi:10.1145/1266977.1266981
-
(2007)
ACM Transactions on Information and System Security
, vol.10
, Issue.3
-
-
Squicciarini, A.1
Bertino, E.2
Ferrari, E.3
Paci, F.4
Thuraisinghm, B.5
-
65
-
-
32844474610
-
Achieving privacy in trust negotiations with an ontology-based approach
-
doi:10.1109/TDSC.2006.3
-
Squicciarini, A., Bertino, E., Ferrari, E., & Ray, I. (2006). Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. IEEE Transactions on Dependable and Secure Computing, 3(1), 13-30. doi:10.1109/TDSC.2006.3
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 13-30
-
-
Squicciarini, A.1
Bertino, E.2
Ferrari, E.3
Ray, I.4
-
66
-
-
34250782624
-
Trust negotiations with customizable anonymity
-
In
-
Squicciarini, A., Spantzel, A., Bertino, E., Ferrari, E., & Ray, I. (2006). Trust Negotiations with Customizable Anonymity. In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-ATW06) (pp. 69-72).
-
(2006)
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-ATW06)
, pp. 69-72
-
-
Squicciarini, A.1
Spantzel, A.2
Bertino, E.3
Ferrari, E.4
Ray, I.5
-
68
-
-
46749123518
-
Enhancing role-based access control model through fuzzy relations
-
In, Washington, DC: IEEE Computer Society Press
-
Takabi, H., Amini, M., & Jalili, R. (2006). Enhancing Role-Based Access Control Model through Fuzzy Relations. In Proceedings of the third International Conference on Information Assurance and Security (IAS07) (pp. 131-136). Washington, DC: IEEE Computer Society Press.
-
(2006)
Proceedings of the Third International Conference on Information Assurance and Security (IAS07)
, pp. 131-136
-
-
Takabi, H.1
Amini, M.2
Jalili, R.3
-
69
-
-
33947288450
-
Supporting quality of privacy (QOP) in pervasive computing
-
In, New York: ACM Press
-
Tentori, M., Favela, J., Gonzalez, V., & Rodriguez, M. (2005). Supporting Quality of Privacy (QOP) in Pervasive Computing. In Proceeding of the Sixth Mexican International Conference on Computer Science (pp. 58-67). New York: ACM Press.
-
(2005)
Proceeding of the Sixth Mexican International Conference on Computer Science
, pp. 58-67
-
-
Tentori, M.1
Favela, J.2
Gonzalez, V.3
Rodriguez, M.4
-
77
-
-
38049015808
-
A trust framework for pervasive computing environments
-
Washington, DC: IEEE Society Press
-
Xu, W., Xin, Y., & Lu, G. (2007). A Trust Framework for Pervasive Computing Environments. In Proceeding of the International Conference on Wireless Communications, Networking and Mobile Computing (WiCom 07) (pp. 2222-2225). Washington, DC: IEEE Society Press.
-
(2007)
In Proceeding of the International Conference on Wireless Communications, Networking and Mobile Computing (WiCom 07)
, pp. 2222-2225
-
-
Xu, W.1
Xin, Y.2
Lu, G.3
-
78
-
-
1642346439
-
-
Unpublished doctoral dissertation, University of Illinois at Urbana-Champaign
-
Yu, T. (2003). Automated Trust Establishment In Open Systems. Unpublished doctoral dissertation, University of Illinois at Urbana-Champaign.
-
(2003)
Automated Trust Establishment in Open Systems
-
-
Yu, T.1
-
80
-
-
84898307060
-
Filtering out unfair recommendations finding for trust model in ubiquitous environments
-
In
-
Yuan, W., Guan, D., Lee, S., Lee, Y., & Lee, H. (2006b). Filtering out unfair recommendations Finding for trust model in ubiquitous environments. In Proceeding of the second International Conference on Information Systems Security (ICISS '06) (pp. 258-263).
-
(2006)
Proceeding of the Second International Conference on Information Systems Security (ICISS '06)
, pp. 258-263
-
-
Yuan, W.1
Guan, D.2
Lee, S.3
Lee, Y.4
Lee, H.5
-
81
-
-
0015558134
-
Outline of a new approach to the analysis of complex systems and decision processes
-
Zadeh, L. A. (1973). Outline of a new Approach to the Analysis of Complex Systems and Decision Processes. IEEE Transactions on Systems, Man, and Cybernetics, 3(1), 28-44.
-
(1973)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.3
, Issue.1
, pp. 28-44
-
-
Zadeh, L.A.1
|