This thesis addresses the discretionary privacy demands of users in heterogeneous distributed systems such as ubiquitous computing environments. Because of the physical proximity and pervasiveness of personal devices, sensors, actuators, and other devices and services, ubiquitous computing environments need a powerful infrastructure for coordinating accesses to these resources. However, this infrastructure makes it easy for malicious administrators to gain access to private information of users. We present models for privacy of a user's communication, unlinkability of a user's accesses, and authorized policy feedback that is both useful and privacy preserving. Our models expose the potential threats to a user's privacy, and allow users to e...
It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that rais...
The new form of digital computational capabilities and internet connectivity are promptly grow. This...
Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, desig...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
As with all the major advances in information and communication technology, ubiquitous computing (ub...
In Ubiquitous Computing environments, service servers play a central role of actively providing info...
Position Paper.International audienceThe main message of this position paper is that ubiquitous comp...
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquito...
The vision of Ubiquitous Computing (UbiComp) foresees a future of context-aware smart systems which ...
: Current developments in information technology are leading to increasing capture and storage of in...
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by...
Privacy is a known issue in ubiquitous computing, exasperated by an oft-cited feature of ubiquitous ...
Over the past several years, the press, trade publications and academic literature have reported wit...
143 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2005.Ubiquitous computing is poise...
Providing privacy protection for ubiquitous environments is a complex task that has only recently ha...
It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that rais...
The new form of digital computational capabilities and internet connectivity are promptly grow. This...
Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, desig...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
As with all the major advances in information and communication technology, ubiquitous computing (ub...
In Ubiquitous Computing environments, service servers play a central role of actively providing info...
Position Paper.International audienceThe main message of this position paper is that ubiquitous comp...
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquito...
The vision of Ubiquitous Computing (UbiComp) foresees a future of context-aware smart systems which ...
: Current developments in information technology are leading to increasing capture and storage of in...
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by...
Privacy is a known issue in ubiquitous computing, exasperated by an oft-cited feature of ubiquitous ...
Over the past several years, the press, trade publications and academic literature have reported wit...
143 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2005.Ubiquitous computing is poise...
Providing privacy protection for ubiquitous environments is a complex task that has only recently ha...
It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that rais...
The new form of digital computational capabilities and internet connectivity are promptly grow. This...
Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, desig...