[PDF][PDF] 重uK

HM Gladney - dominoweb.draco.res.ibm.com
E-business, information serving, and ubiquitous computing will create heavy request traffic
from strangers or even incognitos. Such requests must be managed automatically. Two …

Safe deals between strangers

HM Gladney - arXiv preprint cs/9908012, 1999 - arxiv.org
E-business, information serving, and ubiquitous computing will create heavy request traffic
from strangers or even incognitos. Such requests must be managed automatically. Two …

Online subscriptions with anonymous access

M Blanton - Proceedings of the 2008 ACM symposium on …, 2008 - dl.acm.org
Online privacy is an increasingly important problem, as many services are now offered in a
digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to large data …

A privacy awareness system for ubiquitous computing environments

M Langheinrich - … Göteborg, Sweden, September 29–October 1, 2002 …, 2002 - Springer
Protecting personal privacy is going to be a prime concern for the deployment of ubiquitous
computing systems in the real world. With daunting Orwellian visions looming, it is easy to …

[PDF][PDF] Anonymity and Privacy in Electronic Services, IWT APES deliverable 11 Tools for Technologies and Applications of Controlled Anonymity

C Dıaz, V Naessens, S Nikova, B De Decker, B Preneel - 2004 - cosic.esat.kuleuven.be
Executive summary The APES project is a four year interdisciplinary research project funded
under the STWW program (now called SBO) by the IWT Flanders on “Anonymity and Privacy …

The development of a privacy-enhancing infrastructure: Some interesting findings

P Osbakk, NS Ryan - 2004 - kar.kent.ac.uk
Providing privacy protection for ubiquitous environments is a complex task that has only
recently has become a hot topic. In this paper we describe the current state of our privacy …

[PDF][PDF] Access control is an inadequate framework for privacy protection

L Kagal, H Abelson - W3C Privacy Workshop, 2010 - Citeseer
As Web architects, we might all agree on the need to protect privacy. But what is it that we
want to protect? In Brandeis and Warren's classic legal study [19], privacy is defined as the …

[PDF][PDF] Privacy through broadcast and anonymous response

G Borriello - UbiComp 2004 Privacy Workshop, 2004 - cs.cmu.edu
In this position paper we argue that we need to rethink how we build ubiquitous computing
infrastructure so that protecting users' privacy is the paramount criterion. We advocate a …

Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments

E Magkos, P Kotzanikolaou - Security and Privacy in Mobile Information …, 2010 - Springer
The exchange of user-related sensitive data within a Pervasive Computing Environment
(PCE) raises security and privacy concerns. On one hand, service providers require user …

A privacy-aware access control system

CA Ardagna, M Cremonini… - Journal of …, 2008 - content.iospress.com
The protection of privacy is an increasing concern in our networked society because of the
growing amount of personal information that is being collected by a number of commercial …