메뉴 건너뛰기




Volumn , Issue , 2010, Pages 352-377

Privacy and trust issues in context-aware pervasive computing: State-of-the-art and future directions

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84898146482     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-61520-682-7.ch015     Document Type: Chapter
Times cited : (3)

References (83)
  • 3
    • 0006364798 scopus 로고    scopus 로고
    • Design for privacy in multimedia computing and communications environments
    • In
    • Bellotti, V. (1997). Design for Privacy in Multimedia Computing and Communications Environments. In Technology and Privacy: The New Landscape (pp. 63-98).
    • (1997) Technology and Privacy: The New Landscape , pp. 63-98
    • Bellotti, V.1
  • 18
    • 84900830868 scopus 로고    scopus 로고
    • Understanding and using context
    • Retrieved February 23, 2009, from
    • Dey, A. K. (2001). Understanding and using context. Personal and Ubiquitous Computing Journal, 5(1), 4-7. Retrieved February 23, 2009, from http://www.cc.gatech.edu/fce/ctk/pubs/PeTe5-1.pdf
    • (2001) Personal and Ubiquitous Computing Journal , vol.5 , Issue.1 , pp. 4-7
    • Dey, A.K.1
  • 19
    • 0003461406 scopus 로고    scopus 로고
    • Towards a better understanding of context and contextawareness
    • The Hague, The Netherlands. Retrieved January 8, 2009, from ftp://ftp. cc.gatech.edu/pub/gvu/tr/1999/92-22.pdf
    • Dey, A. K., & Abowd, G. D. (2000). Towards a better understanding of context and contextawareness. The Proceedings of the CHI 2000 Workshop on the What, Who, when, and How of Context-Awareness, The Hague, The Netherlands. Retrieved January 8, 2009, from ftp://ftp. cc.gatech.edu/pub/gvu/tr/1999/92-22.pdf
    • (2000) The Proceedings of the CHI 2000 Workshop on the What, Who, When, and How of Context-Awareness
    • Dey, A.K.1    Abowd, G.D.2
  • 26
    • 0002971942 scopus 로고    scopus 로고
    • Ontology-applications and design
    • doi:10.1145/503124.503146
    • Gruninger, M., & Lee, J. (2002). Ontology-Applications and Design. Communications of the ACM, 45(2), 39-65. doi:10.1145/503124.503146
    • (2002) Communications of the ACM , vol.45 , Issue.2 , pp. 39-65
    • Gruninger, M.1    Lee, J.2
  • 27
    • 2542616812 scopus 로고    scopus 로고
    • Quest for personal control over mobile location privacy
    • doi:10.1109/MCOM.2004.1299356
    • He, Q., Wu, L., & Khosla, P. (2004). Quest for Personal Control over Mobile Location Privacy. IEEE Communications Magazine, 42(5), 130-136. doi:10.1109/MCOM.2004.1299356
    • (2004) IEEE Communications Magazine , vol.42 , Issue.5 , pp. 130-136
    • He, Q.1    Wu, L.2    Khosla, P.3
  • 34
    • 2442557513 scopus 로고    scopus 로고
    • Modeling privacy control in context-aware systems
    • doi:10.1109/MPRV.2002.1037723
    • Jiang, X., & Landay, J. A. (2002). Modeling Privacy Control in Context-Aware Systems. Pervasive Computing, 1(3), 59-63. doi:10.1109/MPRV.2002.1037723
    • (2002) Pervasive Computing , vol.1 , Issue.3 , pp. 59-63
    • Jiang, X.1    Landay, J.A.2
  • 35
    • 0035577649 scopus 로고    scopus 로고
    • Trusted-based secuirty in pervasive computing environments
    • Kagal, L., Finin, T., & Joshi, A. (2001). Trusted-based Secuirty in Pervasive Computing Environments. IEEE Computer Society Press, 34(12), 154-157.
    • (2001) IEEE Computer Society Press , vol.34 , Issue.12 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 45
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • Li, N., Winsborough, W., & Mitchell, J. (2003). Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security, 11(1), 35-86.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.2    Mitchell, J.3
  • 48
    • 67650083441 scopus 로고    scopus 로고
    • Attribute trust-a framework for evaluating trust in aggregated attributes via a reputation system
    • In, Washington, DC: IEEE Computer Society Press
    • th Annual Conference on Privacy, Security and Trust (pp. 201-212). Washington, DC: IEEE Computer Society Press.
    • (2008) th Annual Conference on Privacy, Security and Trust , pp. 201-212
    • Mohan, A.1    Blough, M.2
  • 52
    • 0004198635 scopus 로고    scopus 로고
    • Upper Saddle River, NJ, Prentice-Hall, Inc
    • Pfleeger, P. C. (1997). Security in Computing. Upper Saddle River, NJ: Prentice-Hall, Inc.
    • (1997) Security in Computing
    • Pfleeger, P.C.1
  • 56
    • 33846307093 scopus 로고    scopus 로고
    • Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability
    • doi:10.1007/s11036-006-0008-7
    • Ren, K., & Lou, W. (2007). Privacy-Enhanced, Attack-Resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. Mobile Networks and Applications, 12(1), 79-92. doi:10.1007/s11036-006-0008-7
    • (2007) Mobile Networks and Applications , vol.12 , Issue.1 , pp. 79-92
    • Ren, K.1    Lou, W.2
  • 57
    • 33746373934 scopus 로고    scopus 로고
    • A novel privacy preserving authentication and access control scheme for pervasive computing environments
    • doi:10.1109/TVT.2006.877704
    • Ren, K., Lou, W., Kim, K., & Deng, R. (2006). A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 55(4), 1373-1384. doi:10.1109/TVT.2006.877704
    • (2006) IEEE Transactions on Vehicular Technology , vol.55 , Issue.4 , pp. 1373-1384
    • Ren, K.1    Lou, W.2    Kim, K.3    Deng, R.4
  • 78
    • 1642346439 scopus 로고    scopus 로고
    • Unpublished doctoral dissertation, University of Illinois at Urbana-Champaign
    • Yu, T. (2003). Automated Trust Establishment In Open Systems. Unpublished doctoral dissertation, University of Illinois at Urbana-Champaign.
    • (2003) Automated Trust Establishment in Open Systems
    • Yu, T.1
  • 81
    • 0015558134 scopus 로고
    • Outline of a new approach to the analysis of complex systems and decision processes
    • Zadeh, L. A. (1973). Outline of a new Approach to the Analysis of Complex Systems and Decision Processes. IEEE Transactions on Systems, Man, and Cybernetics, 3(1), 28-44.
    • (1973) IEEE Transactions on Systems, Man, and Cybernetics , vol.3 , Issue.1 , pp. 28-44
    • Zadeh, L.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.