Trigger-action platforms (TAPs) allow users to connect independent web-based or IoT services to achieve useful automation. They provide a simple interface that helps end-users create trigger-compute-action rules that pass data between disparate Internet services. Unfortunately, TAPs introduce a large-scale security risk: if they are compromised, attackers will gain access to sensitive data for millions of users. To avoid this risk, we propose eTAP, a privacy-enhancing trigger-action platform that executes trigger-compute-action rules without accessing users\u27 private data in plaintext or learning anything about the results of the computation. We use garbled circuits as a primitive, and leverage the unique structure of trigger-compute-acti...
Web tracking companies use device fingerprinting to distinguish the users of the websites by checkin...
The ubiquitous Internet of Things (IoT)-enabled applications pose unique challenges to user privacy ...
We consider dynamic group services, where outputs based on small samples of privacy-sensitive user i...
Trigger-Action Platforms (TAPs) connect disparate online services and enable users to create automat...
Trigger-Action Platforms (TAPs) are systems that enable users to automate routine tasks, such as tur...
Trigger-Action platforms are systems that enable users to easily define, in terms of conditional rul...
Trigger-Action Platforms (TAPs) seamlessly connect a wide variety of otherwise unconnected devices a...
The importance of privacy has been growing steadily for over 25 years. Increasingly popularareas (su...
Complex event processing (CEP) is a powerful and increasingly more important tool to analyse data st...
Trigger-action programming (TAP) is a popular end-user programming framework that can simplify the I...
The emergence of Internet of Things (IoT) offers many advantages, but it also raises significant cha...
In today's data-driven world, we are conflicted with two opposing phenomena. On the one hand, collec...
The Internet of Things (IoT) promises to be an enhanced platform for supporting a heterogeneous rang...
IoT apps empower users by connecting a variety of otherwise unconnected services. These apps (or app...
As increasingly more sensitive data is being collected to gain valuable insights, the need to native...
Web tracking companies use device fingerprinting to distinguish the users of the websites by checkin...
The ubiquitous Internet of Things (IoT)-enabled applications pose unique challenges to user privacy ...
We consider dynamic group services, where outputs based on small samples of privacy-sensitive user i...
Trigger-Action Platforms (TAPs) connect disparate online services and enable users to create automat...
Trigger-Action Platforms (TAPs) are systems that enable users to automate routine tasks, such as tur...
Trigger-Action platforms are systems that enable users to easily define, in terms of conditional rul...
Trigger-Action Platforms (TAPs) seamlessly connect a wide variety of otherwise unconnected devices a...
The importance of privacy has been growing steadily for over 25 years. Increasingly popularareas (su...
Complex event processing (CEP) is a powerful and increasingly more important tool to analyse data st...
Trigger-action programming (TAP) is a popular end-user programming framework that can simplify the I...
The emergence of Internet of Things (IoT) offers many advantages, but it also raises significant cha...
In today's data-driven world, we are conflicted with two opposing phenomena. On the one hand, collec...
The Internet of Things (IoT) promises to be an enhanced platform for supporting a heterogeneous rang...
IoT apps empower users by connecting a variety of otherwise unconnected services. These apps (or app...
As increasingly more sensitive data is being collected to gain valuable insights, the need to native...
Web tracking companies use device fingerprinting to distinguish the users of the websites by checkin...
The ubiquitous Internet of Things (IoT)-enabled applications pose unique challenges to user privacy ...
We consider dynamic group services, where outputs based on small samples of privacy-sensitive user i...