A Study on Context Services Model with Location Privacy

Conference object English OPEN
Ko , Hoon; Marreiros , Goreti; Vale , Zita; Choi , Jongmyung;
(2011)
  • Publisher: Springer
  • Related identifiers: doi: 10.1007/978-3-642-23300-5_25
  • Subject: [INFO] Computer Science [cs] | Security | Location Privacy | [ INFO ] Computer Science [cs] | [ SHS.INFO ] Humanities and Social Sciences/Library and information sciences | Context-Aware | OTP (One Time Password) | Context-Services | [SHS.INFO] Humanities and Social Sciences/Library and information sciences

Part 2: Workshop; International audience; A lot of smart context-aware services would be adopting location information as context information. However, the location information is also very important information to be protected for users’ privacy, security, and safety. ... View more
  • References (14)
    14 references, page 1 of 2

    This work is partially supported under the support of the Portuguese Foundation for Science and Technology (FCT) in the aims of Ciência 2007 program for the hiring of Post-PhD researchers.

    John Krumm, “A survey of computational location privacy,” Pervasive Ubiquitous Computing, No.13, pp.391-399, 2009.

    R. J. Hulsebosch, A. H. Salden, M. S. Bargh, P. W. G. Ebben and J. Reitsma, "Context sensitive access control,” SACMAT '05 Proceedings of the tenth ACM symposium on Access control models and technologies, pp.111-119, 2005.

    Garrett Brown, Travis Howe, Micheal Ihbe, Atul Prakash, and Kevin Borders, “Social Networks and Context-Aware Spam,” CSCW'08, November 8-12, 2008, San Diego, California, USA.

    Anind K. Dey, "Understanding and Using Context," Journal Personal and Ubiquitous Computing, vol 5, no 1, pp. 4-7, 2001.

    Djamel H. Sadok, Eduardo Souto, Eduardo Feitosa, Judith Kelner, and Lars Westberg, “RIP-A robust IP access architecture,” Computer & Security, Feb (online)., 2009, pp. 1-22.

    Eiko Yoneki, “Evolution of Ubiquitous computing with Sensor Networks in Urban Environments,” Ubiquitous Computing Conference, Metapolis and Urban Life Workshop Proceedings, September, 2005, pp. 56-59.

    Fetzer, A., “Recontextualizing context,” Proceedings of Context Organiser workshop, April 9-11, Manchester, UK, 1997.

    Wolter Pieters, "Representing Humans in System Security Models: An ActorNetwork Approach," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol 2, No 1, pp.75-92, 2011.

    Philip Nobles, Shahid Ali, Howard Chivers , "Improved Estimation of Trilateration Distances for Indoor Wireless, Intrusion Detection," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol 2, No 1, pp.93- 102, 2011.

  • Related Research Results (1)
    Inferred by OpenAIRE
    software
    jContext software on SourceForge
    72%
  • Metrics
Share - Bookmark