Sciweavers

202 search results - page 6 / 41
» Managing Pervasive Environment Privacy Using the
Sort
View
SAINT
2007
IEEE
14 years 1 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner
PERVASIVE
2005
Springer
14 years 1 months ago
u-Photo: Interacting with Pervasive Services Using Digital Still Images
This paper presents u-Photo which is an interactive digital still image including information of pervasive services associated with networked appliances and sensors in pervasive co...
Genta Suzuki, Shun Aoki, Takeshi Iwamoto, Daisuke ...
ICDCSW
2003
IEEE
14 years 28 days ago
Controlled Availability of Pervasive Web Services
The increasing use of computers to manage everyday business poses problems for workers when they are away from their home environment. There are two key problems: • How can a mo...
Peter Robinson, Stefan Hild
PERVASIVE
2005
Springer
14 years 1 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik
ICAS
2009
IEEE
109views Robotics» more  ICAS 2009»
14 years 2 months ago
Ponder2: A Policy System for Autonomous Pervasive Environments
Policies form an important part of management and can be an effective means of implementing self-adaptation in pervasive systems. Most policy-based systems focus on large-scale ne...
Kevin P. Twidle, Naranker Dulay, Emil Lupu, Morris...