A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Enhancing Privacy by Applying Information Flow Modelling in Pervasive Systems
[chapter]
On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops
By that the pervasive system is represented as an information flow graph. ...
In order to enhance privacy we use this graph to determine the data sources, e.g. video cameras or RFID tags, that need to be switched off to adapt a given system to privacy requirements of a certain person ...
Modelling a pervasive environment To model a pervasive environment we apply the idea of information flow modelling. ...
doi:10.1007/978-3-540-76890-6_5
dblp:conf/otm/OrtmannLM07
fatcat:cuzz2apkvjexnfwk6xu6etxyry
Privacy in Pervasive Computing and Open Issues
2007
The Second International Conference on Availability, Reliability and Security (ARES'07)
Privacy appears as a major issue for pervasive computing applications. Several models have been proposed to address privacy challenges. ...
This paper discusses how privacy might be preserved in a pervasive computing environment. It presents some research developments in these areas to address privacy concerns. ...
Feedback and Control for Privacy in RAVE EuroPARC's RAVE system used principles of Feedback and Control for enhancing privacy [18] . ...
doi:10.1109/ares.2007.115
dblp:conf/IEEEares/BhaskarA07
fatcat:iygio5vx7jatvkxw5pk5k3mf5i
Protecting privacy and anonymity in pervasive computing: trends and perspectives
2006
Telematics and informatics
In the sequel, we examine a number of privacy protection mechanisms for pervasive systems, with a focus on the level of anonymity offered to the end-users. ...
In this paper, we first refer to the privacy threats identified in a pervasive environment; then, we present a set of principles for ensuring privacy in this context. ...
Information collection, processing, and sharing is fundamental to pervasive systems; hence privacy and pervasiveness are, by nature, in conflict. ...
doi:10.1016/j.tele.2005.07.005
fatcat:qkffwamedjev3kpyyhth4xb53m
Maintaining Privacy in Pervasive Computing — Enabling Acceptance of Sensor-Based Services
2004
BT technology journal
In this paper, we introduce the privacy issues found in the field of pervasive computing in two parts. ...
In a worst-case scenario, privacy implications, particularly the bad publicity around invasions of privacy, could block the incredible potential of pervasive computing. ...
Lederer [12] has proposed a cohesive model of privacy in pervasive computing by synthesising Adam's user perceptual model with Lessig's societal model [13] . ...
doi:10.1023/b:bttj.0000047125.97546.4a
fatcat:6akul6gqazdxndvh2gqhowg6le
Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications
2011
2011 IEEE 35th Annual Computer Software and Applications Conference Workshops
Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. ...
In this paper, and in order to bridge the gap of the context information perception by the developers and by the users, we propose to represent the available context information in each domain as a feature ...
Applying P3P practices to pervasive computing environments has been proposed by [4] [14] . ...
doi:10.1109/compsacw.2011.65
dblp:conf/compsac/JarouchehLSZ11
fatcat:y63qkntijrg2hp5woqcsmfxbxe
Dissecting the Security and Protection Issues in Pervasive Computing
2018
Mehran University Research Journal of Engineering and Technology
Pervasive computing refers to the environment where information is accessible anywhere and anytime while existing system is invisible to the user. ...
It has caused new security chaos as the more information about user is collected the more privacy and security concerns it raises, thus, the pervasive computing applications became key concern for user ...
TaintDroid: TaintDroid is an information flow tracking system for runtime privacy monitoring of smartphones proposed by Enck et. al. [31] . ...
doi:10.22581/muet1982.1802.02
fatcat:cua5uvixt5eopnu5vvjbojhnjq
The Inference Problem and Pervasive Computing
2009
Social Science Research Network
information can be derived by released data. ...
The promise of pervasive computing systems, which flood an environment with sensors and smart devices, has been diminished by an inability to adequately address privacy concerns. ...
Many studies of privacy issues within pervasive computing systems begin with a definition of privacy grounded in the informational privacy model. ...
doi:10.2139/ssrn.1508513
fatcat:koqg2knlvnhcfkr5bokkx5zkb4
Modeling privacy control in context-aware systems
2002
IEEE pervasive computing
property for many pervasive computing systems, into our information space model, using unified privacy tagging. ...
In this article, we describe a theoretical model for privacy control in contextaware systems based on a core abstraction of information spaces. ...
property for many pervasive computing systems, into our information space model, using unified privacy tagging. ...
doi:10.1109/mprv.2002.1037723
fatcat:hnbtqhgptzezppsst52cl6p7um
Call for Papers
2020
IEEE Communications Standards Magazine
TheThis special publication piece tackles privacy risk in the IoT. ...
and interests in privacy, security, innovation, free expression, and governance are being playing out. ...
in IoT applications • Privacy threat identification, modeling, and defense mechanisms for cyber physical systems (CPS) • Human and socio-technical aspects in CPS privacy • Managing privacy with authentication ...
doi:10.1109/mcomstd.2020.9088333
fatcat:fvyncer5zjfxfd4uo7tcni3sjy
Call for Papers
2020
IEEE Internet of Things Magazine
IoT and PrIvaCy Importance of topIc TheThis special publication piece tackles privacy risk in the IoT. ...
and interests in privacy, security, innovation, free expression, and governance are being playing out. ...
in IoT applications • Privacy threat identification, modeling, and defense mechanisms for cyber physical systems (CPS) • Human and socio-technical aspects in CPS privacy • Managing privacy with authentication ...
doi:10.1109/miot.2020.9063404
fatcat:lm372gi4frdenobrtqjj5x2yoq
Multi-domain and privacy-aware role based access control in eHealth
2008
2008 Second International Conference on Pervasive Computing Technologies for Healthcare
In this paper, we propose a multi-domain privacy-aware role based access control meeting these requirements. ...
Information Technology-supported Heathcare (eHealth) is crucial in order to reduce healthcare costs, and improve quality of care and patient safety. ...
ACKNOWLEDGMENT The work reported here has been supported by the IBM OCR project "Privacy and Security Policy Management" and the NSF grant 0712846 "IPS: Security Services for Healthcare Applications". ...
doi:10.1109/pcthealth.2008.4571050
dblp:conf/ph/MartinoNLB08
fatcat:6ioawkp35jbtlj4e6ygpe6i6z4
CyNetPhy: Towards Pervasive Defense-in-Depth for Smart Grid Security
[chapter]
2016
Lecture Notes in Computer Science
Simulation results illustrate that the CSL efficiently enhances the attack detection quality, accuracy, and promptness, and highlights the effect of CyNetPhys CSL trustworthy cooperative and pervasive ...
In this article, we present a smart grid layering model and a matching multi-layer security framework, CyNetPhy, towards enabling cross-layer smart grid security. ...
Smart grid has emerged as the next generation power grid aiming at enhancing the efficiency, reliability, and resilience of legacy power systems by employing information and communication technologies ...
doi:10.1007/978-3-319-31664-2_28
fatcat:jsi56rhbtvb4xfjwnxsvanu4e4
Pervasive Sensing Technologies and Emerging Trends
2014
International Journal of Distributed Sensor Networks
Goal of pervasive computing is to prompt a thorough integration on information processing into everyday objects and activities of human beings. ...
"Service-oriented node scheduling schemes with energy efficiency in wireless sensor networks" by H. ...
This model can recompose the information widely collected from the Internet or sensors and share essential information with other connected (or federated) systems. ...
doi:10.1155/2014/303805
fatcat:dgz5aftsyrflpb7onb5h4wcog4
Context-aware Information Management in the Green Move System
2012
Interop-Vlab.It Workshop on Pervasive Computing for Networked Enterprises
In this paper we discuss the use of context-aware techniques applied to data gathering, shared services and information distribution, and how they lead to the reduction of (noisy) information delivered ...
to users and to the personalized, privacy-aware distribution of information among the various system's users. ...
Modeling Context in Green Move In Green Move, context is modeled by means of the Context Dimension Tree (henceforth simply CDT). ...
dblp:conf/invit/PanigatiRST12
fatcat:fp5elmbqzzcm5kzmco2s4kgwwi
Trust enhanced ubiquitous payment without too much privacy loss
2004
Proceedings of the 2004 ACM symposium on Applied computing - SAC '04
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. ...
We present a scheme (and its prototype) that mitigates this loss of privacy without forbidding the use of trust for smoothing payment by giving the opportunity to the user to divide trust (i.e. transactions ...
ACKNOWLEDGMENTS This work is sponsored by the European Union, which funds the IST-2001-32486 SECURE project. ...
doi:10.1145/967900.968218
dblp:conf/sac/SeigneurJ04
fatcat:5i5vq24duvfodpwzoedav7lmbu
« Previous
Showing results 1 — 15 out of 16,857 results