The official PGP user's guide
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
On SDSI's linked local name spaces
Journal of Computer Security
Understanding and Using Context
Personal and Ubiquitous Computing
Modeling Privacy Control in Context-Aware Systems
IEEE Pervasive Computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Trust for Ubiquitous, Transparent Collaboration
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Performance management in ubiquitous computing environments
ICCC '02 Proceedings of the 15th international conference on Computer communication
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Security Architecture in Gaia
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Interacting with trust in ambient intelligence
UbiMob '04 Proceedings of the 1st French-speaking conference on Mobility and ubiquity computing
The claim tool kit for ad hoc recognition of peer entities
Science of Computer Programming - Special issue on principles and practice of programming in java (PPPJ 2003)
Ubiquitous computing environments and its usage access control
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
A payment & receipt business model in U-commerce environment
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
Precision: Privacy Enhanced Context-Aware Information Fusion in Ubiquitous Healthcare
SEPCASE '07 Proceedings of the 1st International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments
Access control management for ubiquitous computing
Future Generation Computer Systems
A Trusted Approach to E-Commerce
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
A review for ubiquitous commerce research and application (2000-2009)
International Journal of Mobile Communications
Different aspects of trust in ubiquitous intelligent transportation systems
Proceedings of the 28th Annual European Conference on Cognitive Ergonomics
E-commerce: protecting purchaser privacy to enforce trust
Electronic Commerce Research
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Seamlessness and privacy enhanced ubiquitous payment
EC-Web'06 Proceedings of the 7th international conference on E-Commerce and Web Technologies
U-commerce research: a literature review and classification
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in a customer, a means to link transactions using the same e-purse is required. Roughly, trust is a result of knowledge. As the number of transactions increases, the resulting increase in knowledge about the user of the e-purse threatens privacy due to global profiling. We present a scheme (and its prototype) that mitigates this loss of privacy without forbidding the use of trust for smoothing payment by giving the opportunity to the user to divide trust (i.e. transactions) according to context (e.g. location, user's current activity or subset of shops).