First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
DOI: 10.1109/securecomm.2005.8
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Service for Context-aware Mobile Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0
4

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(22 citation statements)
references
References 6 publications
0
18
0
4
Order By: Relevance
“…To investigate the cost of the privacy protection for the diverse nodes sitting at the different levels of HHA, scalable versions of the Rule Manager have been simulated with 50, 100, 150 and 200 rules (both for low-and high-level context data and for personal user data) and with 3, 6 and 10 context attributes. The chosen number of rules is also comparable with the simulations in [7].…”
Section: Evaluation Outcome and Discussionmentioning
confidence: 64%
“…To investigate the cost of the privacy protection for the diverse nodes sitting at the different levels of HHA, scalable versions of the Rule Manager have been simulated with 50, 100, 150 and 200 rules (both for low-and high-level context data and for personal user data) and with 3, 6 and 10 context attributes. The chosen number of rules is also comparable with the simulations in [7].…”
Section: Evaluation Outcome and Discussionmentioning
confidence: 64%
“…The Context Privacy Service (CoPS) [7] enables mobile users to control who can access their context data, when, and at what granularity. CoPS does not enable specification of a user's situations and rules based on a user's context.…”
Section: Copsmentioning
confidence: 99%
“…Another worth-mentioning system is CoPS [32], which provides fine-grained mechanisms to control the release of personal context data, as well as techniques to identify misuse of the provided information. In particular, policies in CoPS are organized in a hierarchical manner, on the basis of the priority level of the policy (i.e., organization-level, user-level, default).…”
Section: Network and Cryptographic Protocolsmentioning
confidence: 99%