Abstract. Personalization systems provide customized service based on user preferences. In ubiquitous computing environments, personalization can be achieved based on user preferences stored on mobile devices. This requires a mechanism for capturing user information and making it available to users. However, storing and exchanging potentially personal information raises user privacy concerns. Past solutions to privacy in ubiquitous computing have been ad-hoc, application specific or partially implemented. This work explores a general framework to providing privacy-aware personalization in ubiquitous computing environments. A prototype implementation of the framework has been developed and evaluated. This paper describes the approach used an...
Privacy is one of the most important and difficult research issues in ubiquitous computing. It is qu...
In this paper, we discuss the emerging need for supporting end-user tailorability and privacy with r...
In this paper we present a framework for addressing privacy issues raised by the monitoring of assis...
: Current developments in information technology are leading to increasing capture and storage of in...
Abstract- Thanks to the spread of mobile technologies, we can access to the network anytime and from...
Pervasive environments are characterized by ubiquitous, mobile and embedded computing devices and wi...
The vision of Ubiquitous Computing (UbiComp) foresees a future of context-aware smart systems which ...
Abstract — In recent years, ubiquitous computing applications span such areas as telemedicine, banki...
The concept of “disappearance” underpins the original idea by Weiser on the philosophy of ubiquitous...
The concept of “disappearance” underpins the original idea by Weiser on the philosophy of ubiquitous...
In this thesis, we address privacy concerns in personalized mobile services. While there has been mu...
The concept of “disappearance ” underpins the original idea by Weiser on the philosophy of ubiquitou...
Abstract: Protection of personal data in the Internet is already a challenge today. Users have to ac...
Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physi...
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier t...
Privacy is one of the most important and difficult research issues in ubiquitous computing. It is qu...
In this paper, we discuss the emerging need for supporting end-user tailorability and privacy with r...
In this paper we present a framework for addressing privacy issues raised by the monitoring of assis...
: Current developments in information technology are leading to increasing capture and storage of in...
Abstract- Thanks to the spread of mobile technologies, we can access to the network anytime and from...
Pervasive environments are characterized by ubiquitous, mobile and embedded computing devices and wi...
The vision of Ubiquitous Computing (UbiComp) foresees a future of context-aware smart systems which ...
Abstract — In recent years, ubiquitous computing applications span such areas as telemedicine, banki...
The concept of “disappearance” underpins the original idea by Weiser on the philosophy of ubiquitous...
The concept of “disappearance” underpins the original idea by Weiser on the philosophy of ubiquitous...
In this thesis, we address privacy concerns in personalized mobile services. While there has been mu...
The concept of “disappearance ” underpins the original idea by Weiser on the philosophy of ubiquitou...
Abstract: Protection of personal data in the Internet is already a challenge today. Users have to ac...
Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physi...
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier t...
Privacy is one of the most important and difficult research issues in ubiquitous computing. It is qu...
In this paper, we discuss the emerging need for supporting end-user tailorability and privacy with r...
In this paper we present a framework for addressing privacy issues raised by the monitoring of assis...