2003
DOI: 10.1109/mprv.2003.1186726
|View full text |Cite
|
Sign up to set email alerts
|

Preserving privacy in environments with location-based applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
149
0
4

Year Published

2006
2006
2014
2014

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 285 publications
(161 citation statements)
references
References 2 publications
1
149
0
4
Order By: Relevance
“…Most participants felt that pre-configured profiles (e.g., 'In a Meeting', 'Taking a Break', etc.) could be used to alleviate this complexity, especially if there was a way to Myles [33] proposed a component framework for privacy control which has been integrated to the location service LocServ (Location Service). Through Validator components, LocServ evaluates if the user's location requested by a third party may be disclosed or not.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Most participants felt that pre-configured profiles (e.g., 'In a Meeting', 'Taking a Break', etc.) could be used to alleviate this complexity, especially if there was a way to Myles [33] proposed a component framework for privacy control which has been integrated to the location service LocServ (Location Service). Through Validator components, LocServ evaluates if the user's location requested by a third party may be disclosed or not.…”
Section: Resultsmentioning
confidence: 99%
“…In particular, it should help the user to easily define new rules, evaluate how they work in different situations, and allow her to modify and refine them, in order to properly maintain the desired level of privacy. This main requirement can be translated into the following properties of a Privacy Service, some of which have also been advocated by other researchers [22,33]: -mation is queried;…”
Section: General Requirements Of a Privacy Servicementioning
confidence: 99%
See 2 more Smart Citations
“…Besides defining triggering actions [22] of pervasive applications (e.g., a smart meeting room), a logical language provides a way to infer high-level context information [13,19], such as a user's activity, from raw sensor data. One promising application of the logic-based approach is a context-sensitive authorization system [1,2,6,8,11,18,24] that considers a requester's context as well as his identity to make a granting decision; the system derives the granting decision (true or false) with a set of rules encoding policies and facts encoding context information.…”
Section: Introductionmentioning
confidence: 99%