Abstract- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing environment, in which user's mobile terminal assists in their activity. In the ubiquitous computing environment, user's mobile terminal manages personal information, which is used for negotiations with a service provider. However, various privacy problems, such as information leakage cases, have happened, so that we desire to protect our personal information. We propose a framework for protecting personal information. A basic idea of the framework is to make use of personal information through a program which the owner of personal information knows the...
In last 3-4 years use of advanced mobile devices such as PDA and smartphone has become a regular pra...
Abstract—As the use of personal information in social net-work sites seems manifold, including the r...
Online personal data are rarely, if ever, effectively controlled by the users they concern. Worse, ...
The evolution of mobile technologies enables us to realize ubiquitous computing environments. In suc...
Abstract. Personalization systems provide customized service based on user preferences. In ubiquitou...
IoT personal devices are having an undoubtedly explosive growth as many different products become av...
Smartphones and mobile applications have become an essential part of our daily lives. People always ...
Some of Internet services require users to provide their information such as their name, address, cr...
This paper was presented and part of the proceedings of The MAURICON 2018 International Conference o...
Modern services request personal information from their customers. The personal information is not n...
Modern services request personal information from their customers. The personal information is not n...
We address the problem of protecting the privacy of individuals in the information society. Our goal...
Mobile device utilization continues to experience considerable growth and the privacy and security o...
Mobile device utilization continues to experience considerable growth and the privacy and security o...
Mobile device utilization continues to experience considerable growth and the privacy and security o...
In last 3-4 years use of advanced mobile devices such as PDA and smartphone has become a regular pra...
Abstract—As the use of personal information in social net-work sites seems manifold, including the r...
Online personal data are rarely, if ever, effectively controlled by the users they concern. Worse, ...
The evolution of mobile technologies enables us to realize ubiquitous computing environments. In suc...
Abstract. Personalization systems provide customized service based on user preferences. In ubiquitou...
IoT personal devices are having an undoubtedly explosive growth as many different products become av...
Smartphones and mobile applications have become an essential part of our daily lives. People always ...
Some of Internet services require users to provide their information such as their name, address, cr...
This paper was presented and part of the proceedings of The MAURICON 2018 International Conference o...
Modern services request personal information from their customers. The personal information is not n...
Modern services request personal information from their customers. The personal information is not n...
We address the problem of protecting the privacy of individuals in the information society. Our goal...
Mobile device utilization continues to experience considerable growth and the privacy and security o...
Mobile device utilization continues to experience considerable growth and the privacy and security o...
Mobile device utilization continues to experience considerable growth and the privacy and security o...
In last 3-4 years use of advanced mobile devices such as PDA and smartphone has become a regular pra...
Abstract—As the use of personal information in social net-work sites seems manifold, including the r...
Online personal data are rarely, if ever, effectively controlled by the users they concern. Worse, ...