Middleware for location privacy: an overview
暂无分享,去创建一个
[1] Peter Langendörfer,et al. Towards User Defined Privacy in Location- Aware Platforms , 2002, International Conference on Internet Computing.
[2] M. Culnan. Protecting Privacy Online: Is Self-Regulation Working? , 2000 .
[3] Matthias Baldauf,et al. A survey on context-aware systems , 2007, Int. J. Ad Hoc Ubiquitous Comput..
[4] Adrian David Cheok,et al. Pervasive games: bringing computer entertainment back to the real world , 2005, CIE.
[5] Harry Chen,et al. An ontology for context-aware pervasive computing environments , 2003, The Knowledge Engineering Review.
[6] J. Al-Muhtadi,et al. Mobile Gaia: a middleware for ad-hoc pervasive computing , 2005, Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005.
[7] Bill N. Schilit,et al. Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.
[8] Ling Liu,et al. MobiMix: Protecting location privacy with mix-zones over road networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[9] Yufei Tao,et al. Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.
[10] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[11] Gregory D. Abowd,et al. Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.
[12] R. Crawshaw,et al. 2. Universal Declaration of Human Rights , 2008 .
[13] Upkar Varshney,et al. M-Commerce Services: Promises and Challenges , 2004, Commun. Assoc. Inf. Syst..
[14] Marvin Theimer,et al. Providing location information in a ubiquitous computing environment (panel session) , 1994, SOSP '93.
[15] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[16] Staffan Björk,et al. Pirates! Using the Physical World as a Game Board , 2001, INTERACT.
[17] Bashar Nuseibeh,et al. Keeping ubiquitous computing to yourself: A practical model for user control of privacy , 2005, Int. J. Hum. Comput. Stud..
[18] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[19] W. Hasselbring,et al. Proceedings of the IASTED International Conference on Software Engineering : as part of the 25th IASTED International Multi-Conference on Applied Informatics : February 13-15, 2007, Innsbruck, Austria , 2007 .
[20] Marco Bessi. A survey about context-aware middleware , 2009 .
[21] Marvin Theimer,et al. Scalable, secure, mobile computing with location information , 1993, CACM.
[22] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[23] Mingxuan Yuan,et al. Dynamic privacy management: a plug-in service for the middleware in pervasive computing , 2005, Mobile HCI.
[24] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[25] Gregory D. Abowd,et al. CyberDesk: a framework for providing self-integrating ubiquitous software services , 1997, UIST '97.
[26] Mohamed F. Mokbel,et al. Towards Privacy-Aware Location-Based Database Servers , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).
[27] Chi-Yin Chow,et al. Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks , 2008, SIGMOD Conference.
[28] Sabrina De Capitani di Vimercati,et al. An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.
[29] Mark S. Ackerman,et al. Privacy in pervasive environments: next generation labeling protocols , 2004, Personal and Ubiquitous Computing.
[30] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[31] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[32] Gregory D. Abowd,et al. Cyberguide: A mobile context‐aware tour guide , 1997, Wirel. Networks.
[33] Yi Zheng,et al. Towards a Privacy Policy Enforcement Middleware with Location Intelligence , 2007, 2007 Eleventh International IEEE EDOC Conference Workshop.
[34] Fabien L. Gandon,et al. Context-awareness, privacy and mobile access: a web semantic and multiagent approach , 2004, UbiMob.
[35] Guanling Chen,et al. A Survey of Context-Aware Mobile Computing Research , 2000 .
[36] Eric Puybaret,et al. Universal Declaration of Human Rights , 2006 .
[37] Jukka Riekki,et al. Context-aware middleware for mobile multimedia applications , 2004, MUM '04.
[38] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[39] Paul Coulton,et al. Extending cyberspace: location based games using cellular phones , 2006, CIE.
[40] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[41] Nigel Davies,et al. Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..
[42] Hui Zang,et al. Anonymization of location data does not work: a large-scale measurement study , 2011, MobiCom.
[43] Tristan Henderson,et al. Virtual Walls: Protecting Digital Privacy in Pervasive Environments , 2007, Pervasive.
[44] Gregory D. Abowd,et al. CyberDesk: a framework for providing self-integrating context-aware services , 1998, Knowl. Based Syst..
[45] Peter J. Brown,et al. The Stick-e Document: a Framework for Creating Context-aware Applications , 1996 .
[46] Lorrie Faith Cranor,et al. Web Privacy with P3p , 2002 .
[47] Susanne Boll,et al. Paper chase revisited: a real world game meets hypermedia , 2003, HYPERTEXT '03.
[48] Steve Benford,et al. Where on-line meets on the streets: experiences with mobile mixed reality games , 2003, CHI '03.
[49] James Fogarty,et al. Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications , 2006, CHI.
[50] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[51] Benoît Garbinato,et al. Middleware Support for Context-Aware Applications , 2009, Middleware for Network Eccentric and Mobile Applications.