Privacy, trust, and identity issues for ubiquitous computing

被引:1
作者
Little, Linda [1 ]
机构
[1] Northumbria Univ, Div Psychol, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
关键词
D O I
10.1177/0894439307307679
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
引用
收藏
页码:3 / 5
页数:3
相关论文
共 50 条
[21]   Security policies and trust in ubiquitous computing [J].
Joshi, Anupam ;
Finin, Tim ;
Kagal, Lalana ;
Parker, Jim ;
Patwardhan, Anand .
PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2008, 366 (1881) :3769-3780
[22]   Trust-Based, Privacy-Preserving Context Aggregation and Sharing in Mobile Ubiquitous Computing [J].
Xing, Michael ;
Julien, Christine .
MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES, 2014, 131 :316-329
[23]   An identity privacy enhanced trust model in fully distributed virtual computing environments [J].
Wei, Yunzhao ;
He, Yanxing ;
Hao, Liming .
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, :704-+
[24]   Privacy Context Model for Dynamic Privacy Adaptation in Ubiquitous Computing [J].
Schaub, Florian ;
Koenings, Bastian ;
Dietzel, Stefan ;
Weber, Michael ;
Kargl, Frank .
UBICOMP'12: PROCEEDINGS OF THE 2012 ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING, 2012, :752-757
[25]   Privacy issues of combining ubiquitous computing and software agent technology in a life-critical environinent [J].
Eymann, T ;
Morito, H .
2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, :5627-5632
[26]   Software design issues for ubiquitous computing [J].
Abowd, GD .
IEEE COMPUTER SOCIETY WORKSHOP ON VLSI '98 - SYSTEM LEVEL DESIGN, PROCEEDINGS, 1998, :104-109
[27]   Software engineering issues for ubiquitous computing [J].
Abowd, Gregory D. .
Proceedings - International Conference on Software Engineering, 1999, :75-84
[28]   Smart Privacy Management in Ubiquitous Computing Environments [J].
Buennig, Christian .
HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INFORMATION AND INTERACTION, PT II, 2009, 5618 :131-139
[29]   Personal and Ubiquitous Computing Issue on privacy and security [J].
Schmandt, Chris ;
Ackerman, Mark .
PERSONAL AND UBIQUITOUS COMPUTING, 2004, 8 (06) :389-390
[30]   In Search of User Privacy Protection in Ubiquitous Computing [J].
Cleveland, Simon .
2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2012, :694-699