Lessons learned from the deployment of a smartphone-based access-control system
Proceedings of the 3rd symposium on Usable privacy and security
Seven privacy worries in ubiquitous social computing
Proceedings of the 3rd symposium on Usable privacy and security
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Web Semantics: Science, Services and Agents on the World Wide Web
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
A survey of computational location privacy
Personal and Ubiquitous Computing
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
Defending against sensor-sniffing attacks on mobile phones
Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Modeling people's place naming preferences in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Sensorsafe: a framework for privacy-preserving management of personal sensory information
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
Personal and Ubiquitous Computing
Trap hunting: finding personal data management issues in next generation AAC devices
SLPAT '11 Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies
Privacy aware publishing of successive location information in sensor networks
Future Generation Computer Systems
Radiator: context propagation based on delayed aggregation
Proceedings of the 2013 conference on Computer supported cooperative work
A comparative study of location-sharing privacy preferences in the United States and China
Personal and Ubiquitous Computing
Fine-grained sharing of sensed physical activity: a value sensitive approach
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Hi-index | 0.00 |
We describe our current work in developing novel mechanisms for managing security and privacy in pervasive computing environments. More specifically, we have developed and evaluated three different applications, including a contextual instant messenger, a people finder application, and a phone-based application for access control. We also draw out some themes we have learned thus far for user-controllable security and privacy.