Safe deals between strangers
HM Gladney - arXiv preprint cs/9908012, 1999 - arxiv.org
E-business, information serving, and ubiquitous computing will create heavy request traffic
from strangers or even incognitos. Such requests must be managed automatically. Two …
from strangers or even incognitos. Such requests must be managed automatically. Two …
Online subscriptions with anonymous access
M Blanton - Proceedings of the 2008 ACM symposium on …, 2008 - dl.acm.org
Online privacy is an increasingly important problem, as many services are now offered in a
digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to large data …
digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to large data …
A privacy awareness system for ubiquitous computing environments
M Langheinrich - … Göteborg, Sweden, September 29–October 1, 2002 …, 2002 - Springer
Protecting personal privacy is going to be a prime concern for the deployment of ubiquitous
computing systems in the real world. With daunting Orwellian visions looming, it is easy to …
computing systems in the real world. With daunting Orwellian visions looming, it is easy to …
[PDF][PDF] Anonymity and Privacy in Electronic Services, IWT APES deliverable 11 Tools for Technologies and Applications of Controlled Anonymity
Executive summary The APES project is a four year interdisciplinary research project funded
under the STWW program (now called SBO) by the IWT Flanders on “Anonymity and Privacy …
under the STWW program (now called SBO) by the IWT Flanders on “Anonymity and Privacy …
The development of a privacy-enhancing infrastructure: Some interesting findings
P Osbakk, NS Ryan - 2004 - kar.kent.ac.uk
Providing privacy protection for ubiquitous environments is a complex task that has only
recently has become a hot topic. In this paper we describe the current state of our privacy …
recently has become a hot topic. In this paper we describe the current state of our privacy …
[PDF][PDF] Access control is an inadequate framework for privacy protection
L Kagal, H Abelson - W3C Privacy Workshop, 2010 - Citeseer
As Web architects, we might all agree on the need to protect privacy. But what is it that we
want to protect? In Brandeis and Warren's classic legal study [19], privacy is defined as the …
want to protect? In Brandeis and Warren's classic legal study [19], privacy is defined as the …
[PDF][PDF] Privacy through broadcast and anonymous response
G Borriello - UbiComp 2004 Privacy Workshop, 2004 - cs.cmu.edu
In this position paper we argue that we need to rethink how we build ubiquitous computing
infrastructure so that protecting users' privacy is the paramount criterion. We advocate a …
infrastructure so that protecting users' privacy is the paramount criterion. We advocate a …
Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments
E Magkos, P Kotzanikolaou - Security and Privacy in Mobile Information …, 2010 - Springer
The exchange of user-related sensitive data within a Pervasive Computing Environment
(PCE) raises security and privacy concerns. On one hand, service providers require user …
(PCE) raises security and privacy concerns. On one hand, service providers require user …
A privacy-aware access control system
CA Ardagna, M Cremonini… - Journal of …, 2008 - content.iospress.com
The protection of privacy is an increasing concern in our networked society because of the
growing amount of personal information that is being collected by a number of commercial …
growing amount of personal information that is being collected by a number of commercial …