Sciweavers

91 search results - page 4 / 19
» Architecting Pervasive Computing Systems for Privacy: A Surv...
Sort
View
CHI
2005
ACM
14 years 9 months ago
Sharing the big apple: a survey study of people, place and locatability
With the advancement in technologies to locate individuals, there has been an emergence of information systems that link People-to-People-to-Geographical-Places, labeled P3Systems...
Sukeshini A. Grandhi, Quentin Jones, Samer Karam
PERVASIVE
2005
Springer
14 years 2 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 2 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
WETICE
2007
IEEE
14 years 2 months ago
Enabling Collaborative eHealth through Triplespace Computing
The design and promotion of electronic patient summaries as an instrument to facilitate the pervasive delivery of healthcare is emerging as a key technology in eHealth solutions. ...
Lyndon J. B. Nixon, Dario Cerizza, Emanuele Della ...
ACSW
2003
13 years 10 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton