Sciweavers

370 search results - page 4 / 74
» Design for Privacy in Ubiquitous Computing Environments
Sort
View
MOBISYS
2004
ACM
14 years 6 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay
HUC
2004
Springer
14 years 13 days ago
Some Assembly Required: Supporting End-User Sensor Installation in Domestic Ubiquitous Computing Environments
This paper explores end-user sensor installation for domestic ubiquitous computing applications and proposes five design principles to support this task. End-user sensor installati...
Chris Beckmann, Sunny Consolvo, Anthony LaMarca
PDCAT
2005
Springer
14 years 16 days ago
Design of a Security Management Middleware in Ubiquitous Computing Environments
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...
TPDS
2010
256views more  TPDS 2010»
13 years 5 months ago
Privacy-Conscious Location-Based Queries in Mobile Environments
— In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. While this ubiquitous computing...
Jianliang Xu, Xueyan Tang, Haibo Hu, Jing Du
SAC
2004
ACM
14 years 14 days ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen