Filters








16,857 Hits in 8.0 sec

Enhancing Privacy by Applying Information Flow Modelling in Pervasive Systems [chapter]

Steffen Ortmann, Peter Langendörfer, Michael Maaser
On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops  
By that the pervasive system is represented as an information flow graph.  ...  In order to enhance privacy we use this graph to determine the data sources, e.g. video cameras or RFID tags, that need to be switched off to adapt a given system to privacy requirements of a certain person  ...  Modelling a pervasive environment To model a pervasive environment we apply the idea of information flow modelling.  ... 
doi:10.1007/978-3-540-76890-6_5 dblp:conf/otm/OrtmannLM07 fatcat:cuzz2apkvjexnfwk6xu6etxyry

Privacy in Pervasive Computing and Open Issues

Pankaj Bhaskar, Sheikh I Ahamed
2007 The Second International Conference on Availability, Reliability and Security (ARES'07)  
Privacy appears as a major issue for pervasive computing applications. Several models have been proposed to address privacy challenges.  ...  This paper discusses how privacy might be preserved in a pervasive computing environment. It presents some research developments in these areas to address privacy concerns.  ...  Feedback and Control for Privacy in RAVE EuroPARC's RAVE system used principles of Feedback and Control for enhancing privacy [18] .  ... 
doi:10.1109/ares.2007.115 dblp:conf/IEEEares/BhaskarA07 fatcat:iygio5vx7jatvkxw5pk5k3mf5i

Protecting privacy and anonymity in pervasive computing: trends and perspectives

Stelios Dritsas, Dimitris Gritzalis, Costas Lambrinoudakis
2006 Telematics and informatics  
In the sequel, we examine a number of privacy protection mechanisms for pervasive systems, with a focus on the level of anonymity offered to the end-users.  ...  In this paper, we first refer to the privacy threats identified in a pervasive environment; then, we present a set of principles for ensuring privacy in this context.  ...  Information collection, processing, and sharing is fundamental to pervasive systems; hence privacy and pervasiveness are, by nature, in conflict.  ... 
doi:10.1016/j.tele.2005.07.005 fatcat:qkffwamedjev3kpyyhth4xb53m

Maintaining Privacy in Pervasive Computing — Enabling Acceptance of Sensor-Based Services

A Soppera, T Burbridge
2004 BT technology journal  
In this paper, we introduce the privacy issues found in the field of pervasive computing in two parts.  ...  In a worst-case scenario, privacy implications, particularly the bad publicity around invasions of privacy, could block the incredible potential of pervasive computing.  ...  Lederer [12] has proposed a cohesive model of privacy in pervasive computing by synthesising Adam's user perceptual model with Lessig's societal model [13] .  ... 
doi:10.1023/b:bttj.0000047125.97546.4a fatcat:6akul6gqazdxndvh2gqhowg6le

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications

Zakwan Jaroucheh, Xiaodong Liu, Sally Smith, Huiqun Zhao
2011 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops  
Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world.  ...  In this paper, and in order to bridge the gap of the context information perception by the developers and by the users, we propose to represent the available context information in each domain as a feature  ...  Applying P3P practices to pervasive computing environments has been proposed by [4] [14] .  ... 
doi:10.1109/compsacw.2011.65 dblp:conf/compsac/JarouchehLSZ11 fatcat:y63qkntijrg2hp5woqcsmfxbxe

Dissecting the Security and Protection Issues in Pervasive Computing

Qaisar Javaid, Humera Yasmeen, Munam Ali Shah, Muhammad Kamran, Adnan Sohail
2018 Mehran University Research Journal of Engineering and Technology  
Pervasive computing refers to the environment where information is accessible anywhere and anytime while existing system is invisible to the user.  ...  It has caused new security chaos as the more information about user is collected the more privacy and security concerns it raises, thus, the pervasive computing applications became key concern for user  ...  TaintDroid: TaintDroid is an information flow tracking system for runtime privacy monitoring of smartphones proposed by Enck et. al. [31] .  ... 
doi:10.22581/muet1982.1802.02 fatcat:cua5uvixt5eopnu5vvjbojhnjq

The Inference Problem and Pervasive Computing

Catherine Ann Dwyer
2009 Social Science Research Network  
information can be derived by released data.  ...  The promise of pervasive computing systems, which flood an environment with sensors and smart devices, has been diminished by an inability to adequately address privacy concerns.  ...  Many studies of privacy issues within pervasive computing systems begin with a definition of privacy grounded in the informational privacy model.  ... 
doi:10.2139/ssrn.1508513 fatcat:koqg2knlvnhcfkr5bokkx5zkb4

Modeling privacy control in context-aware systems

Xiaodong Jiang, J.A. Landay
2002 IEEE pervasive computing  
property for many pervasive computing systems, into our information space model, using unified privacy tagging.  ...  In this article, we describe a theoretical model for privacy control in contextaware systems based on a core abstraction of information spaces.  ...  property for many pervasive computing systems, into our information space model, using unified privacy tagging.  ... 
doi:10.1109/mprv.2002.1037723 fatcat:hnbtqhgptzezppsst52cl6p7um

Call for Papers

2020 IEEE Communications Standards Magazine  
TheThis special publication piece tackles privacy risk in the IoT.  ...  and interests in privacy, security, innovation, free expression, and governance are being playing out.  ...  in IoT applications • Privacy threat identification, modeling, and defense mechanisms for cyber physical systems (CPS) • Human and socio-technical aspects in CPS privacy • Managing privacy with authentication  ... 
doi:10.1109/mcomstd.2020.9088333 fatcat:fvyncer5zjfxfd4uo7tcni3sjy

Call for Papers

2020 IEEE Internet of Things Magazine  
IoT and PrIvaCy Importance of topIc TheThis special publication piece tackles privacy risk in the IoT.  ...  and interests in privacy, security, innovation, free expression, and governance are being playing out.  ...  in IoT applications • Privacy threat identification, modeling, and defense mechanisms for cyber physical systems (CPS) • Human and socio-technical aspects in CPS privacy • Managing privacy with authentication  ... 
doi:10.1109/miot.2020.9063404 fatcat:lm372gi4frdenobrtqjj5x2yoq

Multi-domain and privacy-aware role based access control in eHealth

Lorenzo D. Martino, Qun Ni, Dan Lin, Elisa Bertino
2008 2008 Second International Conference on Pervasive Computing Technologies for Healthcare  
In this paper, we propose a multi-domain privacy-aware role based access control meeting these requirements.  ...  Information Technology-supported Heathcare (eHealth) is crucial in order to reduce healthcare costs, and improve quality of care and patient safety.  ...  ACKNOWLEDGMENT The work reported here has been supported by the IBM OCR project "Privacy and Security Policy Management" and the NSF grant 0712846 "IPS: Security Services for Healthcare Applications".  ... 
doi:10.1109/pcthealth.2008.4571050 dblp:conf/ph/MartinoNLB08 fatcat:6ioawkp35jbtlj4e6ygpe6i6z4

CyNetPhy: Towards Pervasive Defense-in-Depth for Smart Grid Security [chapter]

Mohamed Azab, Bassem Mokhtar, Mohammed M. Farag
2016 Lecture Notes in Computer Science  
Simulation results illustrate that the CSL efficiently enhances the attack detection quality, accuracy, and promptness, and highlights the effect of CyNetPhys CSL trustworthy cooperative and pervasive  ...  In this article, we present a smart grid layering model and a matching multi-layer security framework, CyNetPhy, towards enabling cross-layer smart grid security.  ...  Smart grid has emerged as the next generation power grid aiming at enhancing the efficiency, reliability, and resilience of legacy power systems by employing information and communication technologies  ... 
doi:10.1007/978-3-319-31664-2_28 fatcat:jsi56rhbtvb4xfjwnxsvanu4e4

Pervasive Sensing Technologies and Emerging Trends

Jong Hyuk Park, Han-Chieh Chao, Sajid Hussain, Neil Y. Yen
2014 International Journal of Distributed Sensor Networks  
Goal of pervasive computing is to prompt a thorough integration on information processing into everyday objects and activities of human beings.  ...  "Service-oriented node scheduling schemes with energy efficiency in wireless sensor networks" by H.  ...  This model can recompose the information widely collected from the Internet or sensors and share essential information with other connected (or federated) systems.  ... 
doi:10.1155/2014/303805 fatcat:dgz5aftsyrflpb7onb5h4wcog4

Context-aware Information Management in the Green Move System

Emanuele Panigati, Angelo Rauseo, Fabio Alberto Schreiber, Letizia Tanca
2012 Interop-Vlab.It Workshop on Pervasive Computing for Networked Enterprises  
In this paper we discuss the use of context-aware techniques applied to data gathering, shared services and information distribution, and how they lead to the reduction of (noisy) information delivered  ...  to users and to the personalized, privacy-aware distribution of information among the various system's users.  ...  Modeling Context in Green Move In Green Move, context is modeled by means of the Context Dimension Tree (henceforth simply CDT).  ... 
dblp:conf/invit/PanigatiRST12 fatcat:fp5elmbqzzcm5kzmco2s4kgwwi

Trust enhanced ubiquitous payment without too much privacy loss

Jean-Marc Seigneur, Christian Damsgaard Jensen
2004 Proceedings of the 2004 ACM symposium on Applied computing - SAC '04  
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not.  ...  We present a scheme (and its prototype) that mitigates this loss of privacy without forbidding the use of trust for smoothing payment by giving the opportunity to the user to divide trust (i.e. transactions  ...  ACKNOWLEDGMENTS This work is sponsored by the European Union, which funds the IST-2001-32486 SECURE project.  ... 
doi:10.1145/967900.968218 dblp:conf/sac/SeigneurJ04 fatcat:5i5vq24duvfodpwzoedav7lmbu
« Previous Showing results 1 — 15 out of 16,857 results