Sciweavers

391 search results - page 3 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
PERVASIVE
2009
Springer
14 years 28 days ago
On the Anonymity of Home/Work Location Pairs
Abstract. Many applications benefit from user location data, but location data raises privacy concerns. Anonymization can protect privacy, but identities can sometimes be inferred...
Philippe Golle, Kurt Partridge
SOCO
2005
Springer
13 years 11 months ago
Ad Hoc Composition of User Tasks in Pervasive Computing Environments
Due to the large success of wireless networks and portable devices, the pervasive computing paradigm is becoming a reality. One of the most challenging objectives to be achieved in...
Sonia Ben Mokhtar, Nikolaos Georgantas, Valé...
IASTEDSE
2004
13 years 7 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
WICSA
2007
13 years 7 months ago
Architecting Pervasive Computing Systems for Privacy: A Survey
In pervasive computing systems, a higher number of interactions will be mediated by computers, amplifying the menace to privacy. Privacy protection in pervasive environments is st...
Roberto Speicys Cardoso, Valérie Issarny
AMI
2009
Springer
14 years 22 days ago
Adaptive User Profiles in Pervasive Advertising Environments
Abstract: Nowadays modern advertising environments try to provide more efficient ads by targeting costumers based on their interests. Various approaches exist today as to how infor...
Florian Alt, Moritz Balz, Stefanie Kristes, Alirez...