Scalable, secure, mobile computing with location information
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Providing location information in a ubiquitous computing environment (panel session)
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Database security
Domains: a framework for structuring management policy
Network and distributed systems management
Mobile Computing: A Systems Integrator's Handbook
Mobile Computing: A Systems Integrator's Handbook
The GSM System for Mobile Communications
The GSM System for Mobile Communications
ACM SIGOPS Operating Systems Review
Towards a General Location Service for Mobile Environments
SDNE '96 Proceedings of the 3rd Workshop on Services in Distributed and Networked Environments (SDNE '96)
Management Policy Service for Distributed Systems
SDNE '96 Proceedings of the 3rd Workshop on Services in Distributed and Networked Environments (SDNE '96)
Realms and states: a framework for location aware mobile computing
WMC '01 Proceedings of the 1st international workshop on Mobile commerce
Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Using Spatial Co-location for Coordination in Ubiquitous Computing Environments
HUC '99 Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing
A security model for distributed product data management system
Computers in Industry - Advanced web technologies for industrial applications
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Implementing access control to people location information
Proceedings of the ninth ACM symposium on Access control models and technologies
Proceedings of the 6th international conference on Mobile data management
Context for Ubiquitous Data Management
UDM '05 Proceedings of the International Workshop on Ubiquitous Data Management
Access control to people location information
ACM Transactions on Information and System Security (TISSEC)
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Protecting privacy and anonymity in pervasive computing: trends and perspectives
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
Applying privacy on the dissemination of location information
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
Requirements for a location-based access control model
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
A survey of computational location privacy
Personal and Ubiquitous Computing
Enabling location privacy and medical data encryption in patient telemonitoring systems
IEEE Transactions on Information Technology in Biomedicine - Special section on body sensor networks
Jano: specification and enforcement of location privacy in mobile and pervasive environments
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing
Share the secret: enabling location privacy in ubiquitous environments
LoCA'05 Proceedings of the First international conference on Location- and Context-Awareness
LRBAC: a location-aware role-based access control model
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
International Journal of Information Security and Privacy
Hi-index | 0.00 |
Mobile computing, wireless communications, andcheap location tracking and navigation systems have madelocation data a valuable and available commodity formany different kinds of computing applications. However, there are fears that this new wealthof personal location information will lead to newsecurity risks, to the invasion of the privacy of peopleand organizations. In this paper, we discuss security requirements faced by a location service indifferent organizational contexts. We argue thatfine-grained access control requires a symbolic locationmodel over which access control is specified. We outline the salient features of a location servicesupporting such a location model. The two main classicalsecurity models, Lampson's access matrix andBell-LaPadula's security labels, are analyzed with viewto their application to location information. Weargue that those schemes need to be generalized to dealwith multiple targets in order to be applicable tolocation information. Based on the generalized models, we propose a concrete security model forlocation information which protects both personal andorganizational privacy. We have implemented this modelover a prototype implementation of a general location service.