Cryptography and data security
Cryptography and data security
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Location Privacy in the Alipes Platform
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 9 - Volume 9
The many faces of publish/subscribe
ACM Computing Surveys (CSUR)
Evaluating Advanced Routing Algorithms for Content-Based Publish/Subscribe Systems
MASCOTS '02 Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
Less Contact: Heart-Rate Detection Without Even Touching the User
ISWC '04 Proceedings of the Eighth International Symposium on Wearable Computers
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Adapting pervasive systems to multiuser privacy requirements
International Journal of Ad Hoc and Ubiquitous Computing
Protecting user data in ubiquitous computing: towards trustworthy environments
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Adapting pervasive systems to multiuser privacy requirements
International Journal of Ad Hoc and Ubiquitous Computing
U-commerce research: a literature review and classification
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
In this paper, we discuss how diverging privacy requirements in a multiuser ubiquitous environment can be satisfied. We are investigating how to ensure that the requirements of concerned as well as open-minded users can be satisfied, simultaneously. In order to reduce overhead and increase granularity of the objects to be managed, we propose to cluster all available sensors, creating objects we denote as virtual sensors. All further operations are done on the virtual sensors. We will discuss our management architecture and present our simulation environment showing how the pervasive environment automatically adapts to user requirements and user locations.