EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Communications of the ACM
Communications of the ACM
A team collaboration space supporting capture and access of virtual meetings
GROUP '01 Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting Group Work
Murky conceptual waters: The public and the private
Ethics and Information Technology
Protecting Free Expression Online with Freenet
IEEE Internet Computing
Access Control for Active Spaces
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Context Authentication Using Constrained Channels
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Privacy in e-commerce: stated preferences vs. actual behavior
Communications of the ACM - Transforming China
A study of preferences for sharing and privacy
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Awarded Best Student Paper! - Pond: The OceanStore Prototype
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Intentional access management: making access control usable for end-users
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
GEO-RBAC: A spatially aware RBAC
ACM Transactions on Information and System Security (TISSEC)
Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
Personal and Ubiquitous Computing - Special Issue: Selected Papers of the ARCS06 Conference
Survey on location authentication protocols and spatial-temporal attestation services
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Place lab: device positioning using radio beacons in the wild
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
Humans are social creatures that often take pleasure in sharing ideas and opinions with others. While the Internet has made this process much easier (Wikipedia, Flickr, Facebook), it has also made the assembly of such shared information into central profiles with the help of a simple online search dangerously trivial. Access control could of course be used to prevent this, yet this would also limit the sharing of such information to a much smaller set of well-known users, as well as introducing a significant administrative overhead. This article presents FragDB, a storage concept based on localised access control, where data storage and retrieval are bound to a specific place, rather than the knowledge of a particular password or certificate. Data shared using FragDB are much harder to assemble into a profile, as a person's activities across space and time are not centrally assembled, but require actual physical presence for querying. FragDB uses the IDs of tiny RFID-tags embedded in floors, walls, or doors, to compute a local key that is used to encrypt and decrypt data in a global storage system. It is particularly suited to disseminate information pertaining to a particular location or a local group. We describe the requirements and implementation of such a system, and analyse its complexity.