Privacy and Security in Ubiquitous Knowledge Discovery

When we consider wearable computers, smart homes, and various sensors omnipresent in our environment and the data collected by such systems, we can see that ensuring privacy and security is a big challenge in ubiquitous computing (UbiComp). This is due to the fact that ubiquitous computing is highly integrated into our daily lives, making the dependability of these systems ever more central and yet difficult to control.

[1]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[2]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[3]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[4]  Elisa Bertino,et al.  State-of-the-art in privacy preserving data mining , 2004, SGMD.

[5]  Leon G. Higley,et al.  Forensic Entomology: An Introduction , 2009 .

[6]  Joshua Zhexue Huang,et al.  Web services: problems and future directions , 2004, J. Web Semant..

[7]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[8]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[9]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[10]  Chris Clifton,et al.  SECURITY AND PRIVACY IMPLICATIONS OF DATA MINING , 1996 .

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Gregory D. Abowd,et al.  The smart floor: a mechanism for natural user identification and tracking , 2000, CHI Extended Abstracts.

[13]  Salvatore J. Stolfo,et al.  Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.

[14]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[15]  William Frawley,et al.  Knowledge Discovery in Databases , 1991 .

[16]  Adrian Perrig,et al.  Security in wireless sensor networks - eScholarship , 2004 .

[17]  Chris Clifton,et al.  Defining Privacy for Data Mining , 2002 .

[18]  Gregory D. Abowd,et al.  Securing context-aware applications using environment roles , 2001, SACMAT '01.

[19]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[20]  Stan Matwin,et al.  Privacy-Preserving Collaborative Sequential Pattern Mining , 2004 .

[21]  Daniel E. O'Leary,et al.  Knowledge Discovery as a Threat to Database Security , 1991, Knowledge Discovery in Databases.

[22]  Pierangela Samarati,et al.  Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.

[23]  Sushil Jajodia,et al.  Protecting Privacy Against Location-Based Personal Identification , 2005, Secure Data Management.

[24]  A. Pfitzmann,et al.  A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .