Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
暂无分享,去创建一个
Pablo A. Haya | Manuel García-Herranz | Abraham Esquivel | Xavier Alamán | M. García-Herranz | P. Haya | A. Esquivel | X. Alamán
[1] Andy Hopper,et al. The active badge location system , 1992, TOIS.
[2] Geoffrey H. Kuenning,et al. Automated hoarding for mobile computers , 1997, SOSP.
[3] Adam Stone. The dark side of pervasive computing , 2003, IEEE Pervasive Computing.
[4] Timothy W. Finin,et al. A policy language for a pervasive computing environment , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[5] David J. Danelski,et al. Privacy and Freedom , 1968 .
[6] Jason Hong,et al. Towards Everyday Privacy for Ubiquitous Computing , 2003 .
[7] Gaetano Borriello,et al. Location Systems for Ubiquitous Computing , 2001, Computer.
[8] Anind K. Dey,et al. Understanding and Using Context , 2001, Personal and Ubiquitous Computing.
[9] Peter Steenkiste,et al. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[10] Harry Chen,et al. Semantic Web in the context broker architecture , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[11] Gaetano Borriello,et al. UbiComp 2002: Ubiquitous Computing: 4th International Conference Göteborg, Sweden, September 29 – October 1, 2002 Proceedings , 2002, Lecture Notes in Computer Science.
[12] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[13] Jonathan Grudin. Presenting choices in context: approaches to information sharing , 2003 .
[14] Miguel Artola Gallego,et al. Francisco Tomás y Valiente , 1996 .
[15] Bill N. Schilit,et al. An overview of the PARCTAB ubiquitous computing experiment , 1995, IEEE Wirel. Commun..
[16] Roy H. Campbell,et al. Routing through the mist: privacy preserving communication in ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[17] Marco Gruteser,et al. USENIX Association , 1992 .
[18] Nigel Davies,et al. Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..
[19] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[20] Gregory D. Abowd,et al. The Conference Assistant: combining context-awareness with wearable computing , 1999, Digest of Papers. Third International Symposium on Wearable Computers.
[21] Jonathan Trevor,et al. Exploiting space and location as a design framework for interactive mobile systems , 2000, TCHI.
[22] Dean Povey. Optimistic security: a new access control paradigm , 1999, NSPW '99.