Results 1 - 10
of
1,180,328
Privacy-enhanced Location-based Access Control
"... Advancements in location technologies reliability and precision are fostering the development of location-based services that make use of the location information of users. An increasingly important category of such services is represented by Location-based Access Control (LBAC) systems that integr ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
that integrate traditional access control mechanisms with access conditions based on the physical position of users and other attributes related to the users location. Since privacy is extremely important for users, protection of their location information is paramount to the success of such emerging location-based
Privacy-Enhanced Web Personalization
- In P. Brusilovsky, A. Kobsa & W. Nejdl (Eds.), The Adaptive Web: Methods and Strategies of Web Personalization
, 2007
"... Abstract. Consumer studies demonstrate that online users value personalized content. At the same time, providing personalization on websites seems quite profitable for web vendors. This win-win situation is however marred by privacy concerns since personalizing people's interaction entails gath ..."
Abstract
-
Cited by 26 (7 self)
- Add to MetaCart
Abstract. Consumer studies demonstrate that online users value personalized content. At the same time, providing personalization on websites seems quite profitable for web vendors. This win-win situation is however marred by privacy concerns since personalizing people's interaction entails
Privacy-Enhancing Identity Management
"... Issue: Individual privacy is an increasingly important issue in the context of the information society. Privacy-enhancing identity management (IM) offers a means whereby individuals controls the nature and amount of personal information about them that is disclosed. In particular, to achieve privacy ..."
Abstract
- Add to MetaCart
Issue: Individual privacy is an increasingly important issue in the context of the information society. Privacy-enhancing identity management (IM) offers a means whereby individuals controls the nature and amount of personal information about them that is disclosed. In particular, to achieve
ABSTRACT Privacy-Enhanced
, 2008
"... Publishing personal content on the web is gaining increased popularity with dramatic growth in social networking websites, and availability of cheap personal domain names and hosting services. Although the Internet enables easy publishing of any content intended to be generally accessible, restricti ..."
Abstract
- Add to MetaCart
(IM) networks, we propose a scheme called IM-based Privacy-Enhanced Content Sharing (IMPECS) for personal web content sharing. IMPECS enables a publishing user’s personal data to be accessible only to her IM contacts. A user can put her personal web page on any web server she wants (vs. being
A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications
, 2001
"... Computing devices and applications are now used beyond the desktop, in diverse environments, and this trend toward ubiquitous computing is accelerating. One challenge that remains in this emerging research field is the ability to enhance the behavior of any application by informing it of the context ..."
Abstract
-
Cited by 891 (28 self)
- Add to MetaCart
Computing devices and applications are now used beyond the desktop, in diverse environments, and this trend toward ubiquitous computing is accelerating. One challenge that remains in this emerging research field is the ability to enhance the behavior of any application by informing
The Cricket Location-Support System
, 2000
"... This paper presents the design, implementation, and evaluation of Cricket, a location-support system for in-building, mobile, locationdependent applications. It allows applications running on mobile and static nodes to learn their physical location by using listeners that hear and analyze informatio ..."
Abstract
-
Cited by 1036 (11 self)
- Add to MetaCart
This paper presents the design, implementation, and evaluation of Cricket, a location-support system for in-building, mobile, locationdependent applications. It allows applications running on mobile and static nodes to learn their physical location by using listeners that hear and analyze
Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility
"... With the significant advances in Information and Communications Technology (ICT) over the last half century, there is an increasingly perceived vision that computing will one day be the 5th utility (after water, electricity, gas, and telephony). This computing utility, like all other four existing u ..."
Abstract
-
Cited by 620 (62 self)
- Add to MetaCart
Cloud computing and provide the architecture for creating Clouds with market-oriented resource allocation by leveraging technologies such as Virtual Machines (VMs). We also provide insights on market-based resource management strategies that encompass both customer-driven service management
Agile Application-Aware Adaptation for Mobility
- SOSP-16
, 1997
"... In this paper we show that application-aware adaptation, a collaborative partnership between the operating system and applications, offers the most general and effective approach to mobile information access. We describe the design of Odyssey, a prototype implementing this approach, and show how it ..."
Abstract
-
Cited by 503 (31 self)
- Add to MetaCart
In this paper we show that application-aware adaptation, a collaborative partnership between the operating system and applications, offers the most general and effective approach to mobile information access. We describe the design of Odyssey, a prototype implementing this approach, and show how
The Anatomy of a Context-Aware Application
- WIRELESS NETWORKS, VOL
, 1999
"... We describe a platform for context-aware computing which enables applications to follow mobile users as they move around a building. The platform is particularly suitable for richly equipped, networked environments. The only item a user is required to carry is a small sensor tag, which identifies th ..."
Abstract
-
Cited by 532 (3 self)
- Add to MetaCart
them to the system and locates them accurately in three dimensions. The platform builds a dynamic model of the environment using these location sensors and resource information gathered by telemetry software, and presents it in a form suitable for application programmers. Use of the platform
Results 1 - 10
of
1,180,328