IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
RIFLE: An Architectural Framework for User-Centric Information-Flow Security
Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture
Labels and event processes in the asbestos operating system
Proceedings of the twentieth ACM symposium on Operating systems principles
Making information flow explicit in HiStar
OSDI '06 Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7
Panorama: capturing system-wide information flow for malware detection and analysis
Proceedings of the 14th ACM conference on Computer and communications security
Pocket Hypervisors: Opportunities and Challenges
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
Flicker: an execution infrastructure for tcb minimization
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Micro-Blog: sharing and querying content through mobile phones and social participation
Proceedings of the 6th international conference on Mobile systems, applications, and services
Location-based trust for mobile user-generated content: applications, challenges and implementations
Proceedings of the 9th workshop on Mobile computing systems and applications
Enabling new mobile applications with location proofs
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
LiveCompare: grocery bargain hunting through participatory sensing
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Proceedings of the 7th international conference on Mobile systems, applications, and services
Not-a-Bot: improving service availability in the face of botnet attacks
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
SMILE: encounter-based trust for mobile social services
Proceedings of the 16th ACM conference on Computer and communications security
Towards trustworthy participatory sensing
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Device driver safety through a reference validation mechanism
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
PROTECT: proximity-based trust-advisor using encounters for mobile societies
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
VeriPlace: a privacy-aware location proof architecture
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
Dynamic pricing incentive for participatory sensing
Pervasive and Mobile Computing
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure
Proceedings of the fourth ACM conference on Wireless network security
Security versus energy tradeoffs in host-based mobile malware detection
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Poster: practical trusted computing for mhealth sensing
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Quality control for real-time ubiquitous crowdsourcing
Proceedings of the 2nd international workshop on Ubiquitous crowdsouring
YouProve: authenticity and fidelity in mobile sensing
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
Defining trust evidence: research directions
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Ikarus: large-scale participatory sensing at high altitudes
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Plug-n-trust: practical trusted sensing for mhealth
Proceedings of the 10th international conference on Mobile systems, applications, and services
Software abstractions for trusted sensors
Proceedings of the 10th international conference on Mobile systems, applications, and services
Advancing the state of mobile cloud computing
Proceedings of the third ACM workshop on Mobile cloud computing and services
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Using trustworthy host-based information in the network
Proceedings of the seventh ACM workshop on Scalable trusted computing
PShare: Ensuring location privacy in non-trusted systems through multi-secret sharing
Pervasive and Mobile Computing
Towards a generic framework for trustworthy spatial crowdsourcing
Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Acess
GeoTruCrowd: trustworthy query answering with spatial crowdsourcing
Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Privacy disclosure risk: smartphone user guide
International Journal of Mobile Network Design and Innovation
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Commodity mobile devices have been utilized as sensor nodes in a variety of domains, including citizen journalism, mobile social services, and domestic eldercare. In each of these domains, data integrity and device-owners' privacy are first-class concerns, but current approaches to secure sensing fail to balance these properties. External signing infrastructure cannot attest to the values generated by a device's sensing hardware, while trusted sensing hardware does not allow users to securely reduce the fidelity of readings in order to preserve their privacy. In this paper we examine the challenges posed by the potentially conflicting goals of data integrity and user privacy and propose a trustworthy mobile sensing platform which leverages inexpensive commodity Trusted Platform Module (TPM) hardware.