2003
DOI: 10.1109/mprv.2003.1203757
|View full text |Cite
|
Sign up to set email alerts
|

Challenges in location-aware computing

Abstract: Much of the information that underpins the challenges facing society today-such as terrorist activities, global environmental change, and natural disasters-is geospatial in nature. An everyday example of key geospatial data is the location of a cell phone user who has dialed 911 in an emergency. In terrorist situations, the origins and destinations of phone calls, travel patterns of individuals, dispersal patterns of airborne chemicals, assessment of places at risk, and the allocation of resources are all geos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
36
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 106 publications
(40 citation statements)
references
References 6 publications
0
36
0
Order By: Relevance
“…The major challenges in geo-spatial computing were covered in the summary of the recent NRC's IT roadmap to a geo-spatial future [21]. One of the issues mentioned as a future challenge are "fine-grained access control mechanisms permitting the precise release of location information to just the right parties under the right circumstances."…”
Section: Related Workmentioning
confidence: 99%
“…The major challenges in geo-spatial computing were covered in the summary of the recent NRC's IT roadmap to a geo-spatial future [21]. One of the issues mentioned as a future challenge are "fine-grained access control mechanisms permitting the precise release of location information to just the right parties under the right circumstances."…”
Section: Related Workmentioning
confidence: 99%
“…Location detection of personnel or medical equipment inside a hospital, moving assets inside a store, location detection of firemen inside a building on fire, intelligent guidance, location-aware multimedia services are examples of these applications [2][3][4] .…”
Section: Introduction and Related Workmentioning
confidence: 99%
“…1 The most important requirements relate to privacy and trust, including authenticity and attestation. Here, we focus on authenticating location information, which is necessary when using such information to grant access to a service or to generate evidence such as a certificate guaranteeing an entity's location at some point in time.…”
mentioning
confidence: 99%