Inference management, trust and obfuscation principles for quality of information in emerging pervasive environments
暂无分享,去创建一个
Mani B. Srivastava | Murat Sensoy | Chatschik Bisdikian | Timothy J. Norman | Supriyo Chakraborty | Christopher Gibson
[1] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[2] Chatschik Bisdikian,et al. Selecting Relevant Sensor Providers for Meeting "Your" Quality Information Needs , 2011, 2011 IEEE 12th International Conference on Mobile Data Management.
[3] Michael Hicks,et al. Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.
[4] Mani B. Srivastava,et al. Trust and obfuscation principles for quality of information in emerging pervasive environments , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[5] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[6] Guy Pujolle,et al. An XML Model for SLA Definition with Key Indicators , 2007, IPOM.
[7] Peter Steenkiste,et al. Access control to people location information , 2005, TSEC.
[8] Nicholas R. Jennings,et al. TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.
[9] Douglas M. Blough,et al. Data obfuscation: anonymity and desensitization of usable data sets , 2004, IEEE Security & Privacy Magazine.
[10] Jie Zhang,et al. A COMPREHENSIVE APPROACH FOR SHARING SEMANTIC WEB TRUST RATINGS , 2007, Comput. Intell..
[11] Diogo R. Ferreira,et al. Preprocessing techniques for context recognition from accelerometer data , 2010, Personal and Ubiquitous Computing.
[12] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[13] Paul Ohm. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .
[14] David L. Black,et al. An Architecture for Differentiated Service , 1998 .
[15] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[16] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[17] James Won-Ki Hong,et al. OSLAM: Towards ontology-based SLA management for IPTV services , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.
[18] Philip S. Yu,et al. Truth Discovery with Multiple Conflicting Information Providers on the Web , 2007, IEEE Transactions on Knowledge and Data Engineering.
[19] Gene T. Whipps,et al. A dynamic infrastructure for interconnecting disparate ISR/ISTAR assets (the ITA sensor fabric) , 2009, 2009 12th International Conference on Information Fusion.
[20] Abbe Mowshowitz,et al. Experimental Evaluation of the Performance and Scalability of a Dynamic Distributed Federated Database , 2009 .
[21] Christine Julien,et al. Quality-of-inference (QoINF)-aware context determination in assisted living environments , 2009, WiMD '09.
[22] A. Jøsang,et al. Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .
[23] Hong Linh Truong,et al. MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).
[24] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[25] Mani B. Srivastava,et al. Balancing value and risk in information sharing through obfuscation , 2012, 2012 15th International Conference on Information Fusion.
[26] Zainul Charbiwala,et al. Balancing behavioral privacy and information utility in sensory data flows , 2012, Pervasive Mob. Comput..
[27] Munindar P. Singh,et al. Detecting deception in reputation management , 2003, AAMAS '03.
[28] Diane M. Strong,et al. Beyond Accuracy: What Data Quality Means to Data Consumers , 1996, J. Manag. Inf. Syst..
[29] Mani B. Srivastava,et al. Building principles for a quality of information specification for sensor information , 2009, 2009 12th International Conference on Information Fusion.
[30] David Howard,et al. A Comparison of Feature Extraction Methods for the Classification of Dynamic Activities From Accelerometer Data , 2009, IEEE Transactions on Biomedical Engineering.
[31] Mani B. Srivastava,et al. Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment , 2011, CHI.
[32] Deborah Estrin,et al. Using mobile phones to determine transportation modes , 2010, TOSN.
[33] Lance Kaplan,et al. On truth discovery in social sensing: A maximum likelihood estimation approach , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).
[34] Jadwiga Indulska,et al. A survey of context modelling and reasoning techniques , 2010, Pervasive Mob. Comput..
[35] Ling Bao,et al. Activity Recognition from User-Annotated Acceleration Data , 2004, Pervasive.
[36] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[37] C. Badcock,et al. Trust : making and breaking cooperative relations , 1989 .
[38] G. Lewis,et al. Service Level Agreements in Service-Oriented Architecture Environments , 2008 .
[39] Katia P. Sycara,et al. Stereotypical trust and bias in dynamic multiagent systems , 2013, TIST.