We describe our current work in developing novel mechanisms for managing security and privacy in pervasive computing environments. More specifically, we have developed and evaluated three different applications, including a contextual instant messenger, a people finder application, and a phone-based application for access control. We also draw out some themes we have learned thus far for user-controllable security and privacy
Abstract. Personalization systems provide customized service based on user preferences. In ubiquitou...
The vision of pervasive computing promises a shift from information technology per se to what can be...
eld of Pervasive Computing has emerged as an active research area in the past few years [8]. Pervasi...
We describe our current work in developing novel mechanisms for managing security and privacy in per...
Pervasive computing is a relatively new area of interest within computer science. Most of the challe...
Pervasive environments are characterized by ubiquitous, mobile and embedded computing devices and wi...
This paper discusses the main issues regarding the reliability and the efficacy of standard cryptogr...
Abstract: Protection of personal data in the Internet is already a challenge today. Users have to ac...
Pervasive and mobile computing applications are dramatically increasing the amount of personal data ...
The widespread prevalence of pervasive devices and applications has raised the concerns of privacy. ...
Abstract. The explosive evolution of pervasive computing environments presents several new challenge...
Privacy appears as a major issue for pervasive computing applications. Several models have been prop...
Ubiquitous systems enable us to have an overview of what digital environments will look like in the ...
According to a recent survey, in 2005, 500+ million people used handheld devices (PDA, cell phone, e...
Abstract. This paper describes the design and implementation of a dynamic privacy management system ...
Abstract. Personalization systems provide customized service based on user preferences. In ubiquitou...
The vision of pervasive computing promises a shift from information technology per se to what can be...
eld of Pervasive Computing has emerged as an active research area in the past few years [8]. Pervasi...
We describe our current work in developing novel mechanisms for managing security and privacy in per...
Pervasive computing is a relatively new area of interest within computer science. Most of the challe...
Pervasive environments are characterized by ubiquitous, mobile and embedded computing devices and wi...
This paper discusses the main issues regarding the reliability and the efficacy of standard cryptogr...
Abstract: Protection of personal data in the Internet is already a challenge today. Users have to ac...
Pervasive and mobile computing applications are dramatically increasing the amount of personal data ...
The widespread prevalence of pervasive devices and applications has raised the concerns of privacy. ...
Abstract. The explosive evolution of pervasive computing environments presents several new challenge...
Privacy appears as a major issue for pervasive computing applications. Several models have been prop...
Ubiquitous systems enable us to have an overview of what digital environments will look like in the ...
According to a recent survey, in 2005, 500+ million people used handheld devices (PDA, cell phone, e...
Abstract. This paper describes the design and implementation of a dynamic privacy management system ...
Abstract. Personalization systems provide customized service based on user preferences. In ubiquitou...
The vision of pervasive computing promises a shift from information technology per se to what can be...
eld of Pervasive Computing has emerged as an active research area in the past few years [8]. Pervasi...