The anatomy of a context-aware application
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Experiences of developing and deploying a context-aware tourist guide: the GUIDE project
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Designing for Ubiquity: The Perception of Privacy
IEEE Pervasive Computing
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
Extending Context Models for Privacy in Pervasive Computing Environments
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Consistent Modelling of Users, Devices and Sensors in a Ubiquitous Computing Environment
User Modeling and User-Adapted Interaction
Access control to people location information
ACM Transactions on Information and System Security (TISSEC)
Secure context-sensitive authorization
Pervasive and Mobile Computing
The Last Inch at 70 Miles Per Hour
IEEE Pervasive Computing
Privacy-Aware Autonomous Agents for Pervasive Healthcare
IEEE Intelligent Systems
SmokeScreen: flexible privacy controls for presence-sharing
Proceedings of the 5th international conference on Mobile systems, applications and services
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees
Proceedings of the 12th ACM symposium on Access control models and technologies
A system for locating mobile terminals with tunable privacy
Journal of Theoretical and Applied Electronic Commerce Research
Privacy and community connectedness: designing intelligent environments for our cities
OZCHI '07 Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
Automatic identification of informal social groups and places for geo-social recommendations
International Journal of Mobile Network Design and Innovation
Can Ferris Bueller still have his day off? protecting privacy in the wireless era
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
A survey of 'young social' and 'professional' users of location-based services in the UK
Journal of Location Based Services
Location privacy based on trusted computing and secure logging
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Landscape-aware location-privacy protection in location-based services
Journal of Systems Architecture: the EUROMICRO Journal
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
A hybrid positioning system for technology-independent location-aware computing
Software—Practice & Experience
Smart Privacy Management in Ubiquitous Computing Environments
Proceedings of the Symposium on Human Interface 2009 on Human Interface and the Management of Information. Information and Interaction. Part II: Held as part of HCI International 2009
Protecting location privacy against spatial inferences: the PROBE approach
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Location privacy enforcement in a location-based services platform
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Moving towards inclusive design guidelines for socially and ethically aware HCI
Interacting with Computers
Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks
Mobile Networks and Applications
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Evaluating confidence in context for context-aware security
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
Towards personal privacy control
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
A critical approach to privacy research in ubiquitous environments-issues and underlying assumptions
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
On the consistency of distributed proofs with hidden subtrees
ACM Transactions on Information and System Security (TISSEC)
Providing location privacy in pervasive computing through a hybrid mechanism
International Journal of Internet Technology and Secured Transactions
Context quality and privacy - friends or rivals?
QuaCon'09 Proceedings of the 1st international conference on Quality of context
Wireless location privacy protection in vehicular ad-hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Privacy preserving through a memorizing algorithm in location-based services
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
The PROBE Framework for the Personalized Cloaking of Private Locations
Transactions on Data Privacy
Privacy enhancements for mobile and social uses of consumer electronics
IEEE Communications Magazine
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Proceedings of the Sixth Symposium on Usable Privacy and Security
Proceedings of the Sixth Symposium on Usable Privacy and Security
Dynamic masking of application displays using OCR technologies
IBM Journal of Research and Development
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
Protecting location privacy against inference attacks
Proceedings of the 17th ACM conference on Computer and communications security
Protecting location privacy against inference attacks
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Jano: specification and enforcement of location privacy in mobile and pervasive environments
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing
Evaluating user-centered privacy model (UPM) in pervasive computing systems
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
Crowdsourced news reporting: supporting news content creation with mobile phones
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
A moving-object index for efficient query processing with peer-wise location privacy
Proceedings of the VLDB Endowment
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
Proceedings of the Seventh Symposium on Usable Privacy and Security
Anonymous user tracking for location-based community services
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Scalability in a secure distributed proof system
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Ethically aware design of a location system for people with dementia
ICCHP'06 Proceedings of the 10th international conference on Computers Helping People with Special Needs
A generic privacy enhancing technology for pervasive computing environments
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Building infrastructure support for ubiquitous context-aware systems
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
AI'04 Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence
Incorporating privacy policy into an anonymity-based privacy-preserving ID-Based service platform
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
A user-centric privacy framework for pervasive environments
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
A legal ontology to support privacy preservation in location-based services
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Secure identity management for pseudo-anonymous service access
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
A privacy agent in context-aware ubiquitous computing environments
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Shadow: a middleware in pervasive computing environment for user controllable privacy protection
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Koi: a location-privacy platform for smartphone apps
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Context management for m-commerce applications: determinants, methodology and the role of marketing
Information Technology and Management
Methods for privacy protection considering status of service provider and user community
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Security solutions for highly dynamic car2x networks in the KoFAS initiative
Nets4Cars/Nets4Trains'12 Proceedings of the 4th international conference on Communication Technologies for Vehicles
Uniform obfuscation for location privacy
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Journal of Network and Computer Applications
Location-based crowdsourcing of hyperlocal news: dimensions of participation preferences
Proceedings of the 17th ACM international conference on Supporting group work
Middleware for location privacy: an overview
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Replica-aided load balancing in overlay networks
Journal of Network and Computer Applications
Location privacy policy management system
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
International Journal of Mobile Computing and Multimedia Communications
Emerging Forms of Covert Surveillance Using GPS-Enabled Devices
Journal of Cases on Information Technology
Private proximity detection and monitoring with vicinity regions
Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Acess
Hi-index | 0.00 |
The increase in location-based applications makes protecting personal location information a major challenge. Users must be able to control their location privacy but should be able to do so without constant interventionýthat is, they should be freed from having to click ýoký whenever an application requests access to their location information. The article describes a system that lets users automate control of their location information, thereby minimizing the extent to which the system intrudes on their lives.