Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions
暂无分享,去创建一个
Sabrina De Capitani di Vimercati | Stefano Paraboschi | Pierangela Samarati | Sara Foresti | Giovanni Livraga | P. Samarati | S. Vimercati | S. Paraboschi | G. Livraga | S. Foresti
[1] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[2] Sushil Jajodia,et al. Providing Users’ Anonymity in Mobile Hybrid Networks , 2013, TOIT.
[3] Vincenzo Piuri,et al. Supporting Security Requirements for Resource Management in Cloud Computing , 2012, 2012 IEEE 15th International Conference on Computational Science and Engineering.
[4] Marco Gruteser,et al. USENIX Association , 1992 .
[5] Raymond Chi-Wing Wong,et al. Anonymizing Temporal Data , 2010, 2010 IEEE International Conference on Data Mining.
[6] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[7] V. Piuri,et al. A comprehensive conceptual system-level approach to fault tolerance in Cloud Computing , 2012, 2012 IEEE International Systems Conference SysCon 2012.
[8] Sabrina De Capitani di Vimercati,et al. Microdata Protection , 2007, Encyclopedia of Cryptography and Security.
[9] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[10] Chi-Yin Chow,et al. Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.
[11] Sushil Jajodia,et al. Combining fragmentation and encryption to protect privacy in data storage , 2010, TSEC.
[12] Sabrina De Capitani di Vimercati,et al. Data protection in outsourcing scenarios: issues and directions , 2010, ASIACCS '10.
[13] Bin Jiang,et al. Continuous privacy preserving publishing of data streams , 2009, EDBT '09.
[14] David J. DeWitt,et al. Mondrian Multidimensional K-Anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[15] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[16] Romit Roy Choudhury,et al. Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.
[17] Marco Gamassi,et al. Robust fingerprint detection for access control , 2005 .
[18] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[19] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[20] Vincenzo Piuri,et al. Fault Tolerance Management in Cloud Computing: A System-Level Perspective , 2013, IEEE Systems Journal.
[21] Ying Cai,et al. Location anonymity in continuous location-based services , 2007, GIS.
[22] Pierangela Samarati,et al. Protecting Privacy of User Information in Continuous Location-Based Services , 2012, 2012 IEEE 15th International Conference on Computational Science and Engineering.
[23] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[24] Kyriakos Mouratidis,et al. Anonymous Query Processing in Road Networks , 2010, IEEE Transactions on Knowledge and Data Engineering.
[25] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[26] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[27] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[28] John Seely Brown,et al. The Origins of Ubiquitous Computing Research at PARC in the Late 1980s , 1999, IBM Syst. J..
[29] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[30] Sushil Jajodia,et al. Selective data outsourcing for enforcing privacy , 2011, J. Comput. Secur..
[31] Sabrina De Capitani di Vimercati,et al. An OBDD approach to enforce confidentiality and visibility constraints in data publishing , 2012, J. Comput. Secur..
[32] V. Piuri,et al. Fingerprint Biometrics via Low-cost Sensors and Webcams , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[33] Sushil Jajodia,et al. Providing Mobile Users' Anonymity in Hybrid Networks , 2010, ESORICS.
[34] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[35] Jianliang Xu,et al. Distortion-based anonymity for continuous queries in location-based mobile services , 2009, GIS.
[36] Sabrina De Capitani di Vimercati,et al. Managing and accessing data in the cloud: Privacy risks and approaches , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).
[37] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[38] Rajeev Motwani,et al. Two Can Keep A Secret: A Distributed Architecture for Secure Database Services , 2005, CIDR.
[39] Sushil Jajodia,et al. Fragmentation and Encryption to Enforce Privacy in Data Storage , 2007, ESORICS.
[40] Philippe Golle,et al. Revisiting the uniqueness of simple demographics in the US population , 2006, WPES '06.
[41] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[42] Sabrina De Capitani di Vimercati,et al. An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.
[43] Ernesto Damiani,et al. Location Privacy Protection Through Obfuscation-Based Techniques , 2007, DBSec.
[44] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[45] Pierangela Samarati. Data Security and Privacy in the Cloud , 2014, ISPEC.
[46] Giovanni Livraga. Protecting Privacy in Data Release , 2015, Advances in Information Security.
[47] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.