Journal ArticleDOI
Shadow attacks on users' anonymity in pervasive computing environments
Reads0
Chats0
TLDR
It is shown that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users.About:
This article is published in Pervasive and Mobile Computing.The article was published on 2008-12-01. It has received 11 citations till now. The article focuses on the topics: Information privacy & Privacy software.read more
Citations
More filters
Journal ArticleDOI
COSAR: hybrid reasoning for context-aware activity recognition
Daniele Riboni,Claudio Bettini +1 more
TL;DR: This paper proposes a solution based on the use of ontologies and ontological reasoning combined with statistical inferencing to recognize complex activities that cannot be derived by statistical methods alone.
Proceedings ArticleDOI
Opportunistic sensing: Security challenges for the new paradigm
TL;DR: The security challenges that arise in opportunistic people-centric sensing, a new sensing paradigm leveraging humans as part of the sensing infrastructure, are studied and general solutions that hold promise are suggested.
Journal ArticleDOI
Privacy protection in pervasive systems
Claudio Bettini,Daniele Riboni +1 more
TL;DR: A more holistic view of the privacy problem is taken by discussing other aspects that turn out to be crucial for the widespread adoption of privacy enhancing technologies, and technical challenges like the need for tools augmenting the awareness of individuals and to capture their privacy preferences are discussed.
Journal ArticleDOI
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
TL;DR: This paper identifies a taxonomy classifying eight categories of PETs into three groups, and for better clarity, it considers three categories of personalized services, and points out which PETs best fit each personalized service category.
Book ChapterDOI
Privacy in Georeferenced Context-Aware Services: A Survey
TL;DR: After identifying the benefits and shortcomings of each class of techniques, the paper proposes a combined approach to achieve a more comprehensive solution for privacy preservation in georeferenced context-aware services.
References
More filters
Proceedings ArticleDOI
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Marco Gruteser,Dirk Grunwald +1 more
TL;DR: A middleware architecture and algorithms that can be used by a centralized location broker service that adjusts the resolution of location information along spatial or temporal dimensions to meet specified anonymity constraints based on the entities who may be using location services within a given area.
Journal ArticleDOI
Protecting respondents identities in microdata release
TL;DR: This paper addresses the problem of releasing microdata while safeguarding the anonymity of respondents to which the data refer and introduces the concept of minimal generalization that captures the property of the release process not distorting the data more than needed to achieve k-anonymity.
Journal ArticleDOI
Location privacy in pervasive computing
TL;DR: The mix zone is introduced-a new construction inspired by anonymous communication techniques-together with metrics for assessing user anonymity, based on frequently changing pseudonyms.
Proceedings ArticleDOI
Constraining the Dark Energy Equation of State using Alternative High-z Cosmic Tracers
Manolis Plionis,Roberto Terlevich,Spyros Basilakos,Fabio Bresolin,Elena Terlevich,Jorge Melnick,R. Chávez +6 more
TL;DR: In this paper, the authors propose to use alternative cosmic tracers to measure the dark energy equation of state and the matter content of the universe [w(z)&Ωm].
Proceedings ArticleDOI
The new Casper: query processing for location services without compromising privacy
TL;DR: Zhang et al. as mentioned in this paper presented Casper1, a new framework in which mobile and stationary users can entertain location-based services without revealing their location information, which consists of two main components, the location anonymizer and the privacy-aware query processor.