Optimistic security: a new access control paradigm
Proceedings of the 1999 workshop on New security paradigms
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Extending query rewriting techniques for fine-grained access control
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Passive capture and ensuing issues for a personal lifetime store
Proceedings of the the 1st ACM workshop on Continuous archival and retrieval of personal experiences
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Fine-Grained Activity Recognition by Aggregating Abstract Object Usage
ISWC '05 Proceedings of the Ninth IEEE International Symposium on Wearable Computers
Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Design and experimental analysis of continuous location tracking techniques for Wizard of Oz testing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Challenges for Pervasive RFID-Based Infrastructures
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Sherlock: automatically locating objects for humans
Proceedings of the 6th international conference on Mobile systems, applications, and services
Cascadia: A System for Specifying, Detecting, and Managing RFID Events
Proceedings of the 6th international conference on Mobile systems, applications, and services
Supporting a mobile lost and found community
Proceedings of the 10th international conference on Human computer interaction with mobile devices and services
Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Secure localised storage based on super-distributed RFID-tag infrastructures
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
An access control model for mobile physical objects
Proceedings of the 15th ACM symposium on Access control models and technologies
Refresh: weak privacy model for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Hi-index | 0.00 |
RFID security is a vibrant research area, and many protection mechanisms against unauthorized RFID cloning and reading attacks are emerging. However, little work has yet addressed the complementary issue of privacy for RFID data after it has been captured and stored by an authorized system. In this article, the authors discuss the problem of peer-to-peer privacy for personal RFID data. In this setting, they assume a system with trusted owners and administrators, and focus on ways to constrain peers' access to information about one another. An access control policy, called Physical Access Control, protects privacy by constraining the data a user can obtain from the system to those events that occurred when and where that user was physically present. PAC provides a high level of privacy. It also offers a database view that augments users' memory of places, objects, and people. PAC is a natural, intuitive access-control policy for peer-to-peer privacy. It enables many classes of applications while providing a good baseline trade-off between privacy and utility. This article is part of a special issue on security and privacy.