Privacy Infusion in Ubiquitous Computing
暂无分享,去创建一个
[1] Doo-Kwon Baik,et al. Modeling of Situation-Middleware for TPO metadata based on Event-Condition-Action Rule , 2006, Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06).
[2] Olaf Drögehorn,et al. Framework for middleware in ubiquitous computing systems , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.
[3] Young-Koo Lee,et al. A comprehensive middleware architecture for context-aware ubiquitous computing systems , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).
[4] Y. Murakami. Legal issues for realizing ubiquitous information society , 2004, SICE 2004 Annual Conference.
[5] Mark Weiser,et al. The future of ubiquitous computing on campus , 1998, CACM.
[6] Richard Beckwith,et al. Designing for Ubiquity: The Perception of Privacy , 2003, IEEE Pervasive Comput..
[7] Elizabeth D. Mynatt,et al. Secrets to success and fatal flaws: the design of large-display groupware , 2006, IEEE Computer Graphics and Applications.
[8] Jennifer G. Sheridan,et al. Public Ubiquitous Computing Systems: Lessons from the e-Campus Display Deployments , 2006, IEEE Pervasive Computing.
[9] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[10] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[11] Yong Liu,et al. SmartContacts: a large scale social context service discovery system , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[12] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.
[13] Linda Smith,et al. A Jini/sup TM/ lookup service for resource-constrained devices , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).
[14] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[15] Kavi Kumar Khedo. Context-Aware Systems for Mobile and Ubiquitous Networks , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).
[16] Gabriele Lenzini,et al. Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems , 2006, MTW.
[17] Jesús Favela,et al. Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications , 2006, J. Univers. Comput. Sci..
[18] M. Weiser,et al. Hot topics-ubiquitous computing , 1993 .
[19] Pedro José Marrón,et al. Exploring the Relationship Between Context and Privacy , 2005 .
[20] Roland L. Trope. A warranty of cyberworthiness , 2004, IEEE Security & Privacy Magazine.
[21] Frank P. Coyle,et al. XML, Web Services, and the Data Revolution , 2002 .
[22] Christian Damsgaard Jensen,et al. Trust enhanced ubiquitous payment without too much privacy loss , 2004, SAC '04.
[23] Genevieve Bell,et al. Auspicious computing? , 2004, IEEE Internet Computing.
[24] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[25] Eun-Sun Cho,et al. An ECA rule-based task programming language for ubiquitous environments , 2006, 2006 8th International Conference Advanced Communication Technology.
[26] James A. Landay,et al. Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.
[27] Hyggo Oliveira de Almeida,et al. A flexible middleware for service provision over heterogeneous pervasive networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[28] Wolfgang Hoschek. The Web Service Discovery Architecture , 2002, ACM/IEEE SC 2002 Conference (SC'02).
[29] Milena Radenkovic,et al. Engaging the public through mass-scale multimedia networks , 2006, IEEE MultiMedia.
[30] Chris Dix,et al. Professional XML Web Services , 2001 .