Center - Google Patents
An Architecture for Privacy-Sensitive Ubiquitous ComputingCenter
View PDF- Document ID
- 7313975616933446149
- Author
- Center D
External Links
Snippet
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its longterm success. However, developers currently have little support in designing software architectures and in creating useful and usable interactions that are …
- 238000004458 analytical method 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
- H04W4/08—User group management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/18—Network-specific arrangements or communication protocols supporting networked applications in which the network application is adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/30—Network-specific arrangements or communication protocols supporting networked applications involving profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hong et al. | An architecture for privacy-sensitive ubiquitous computing | |
| Duckham et al. | Location privacy and location-aware computing | |
| US10206065B2 (en) | Place-specific buddy list services | |
| Hong et al. | Privacy risk models for designing privacy-sensitive ubiquitous computing systems | |
| Sadeh et al. | Ambient intelligence: The mycampus experience | |
| US6980993B2 (en) | Schemas for a notification platform and related information services | |
| US7539747B2 (en) | Schema-based context service | |
| Kortuem et al. | Close encounters: Supporting mobile collaboration through interchange of user profiles | |
| Salber et al. | The design and use of a generic context server | |
| Groba et al. | Context-dependent access control for contextual information | |
| Lehikoinen et al. | PePe field study: constructing meanings for locations in the context of mobile presence | |
| Center | An Architecture for Privacy-Sensitive Ubiquitous Computing | |
| Tadj et al. | Context handling in a pervasive computing system framework | |
| Lederer et al. | Towards everyday privacy for ubiquitous computing | |
| Bagüés et al. | Disappearing for a while-using white lies in pervasive computing | |
| Fusco et al. | Location-based social media use in families: qualitative outcomes from participant observations | |
| Ferreira et al. | Distributed context-aware systems | |
| Chae et al. | Role-based access control model for ubiquitous computing environment | |
| Arabo et al. | A framework for user-centred and context-aware identity management in mobile ad hoc networks (UCIM) | |
| Landay et al. | An Architecture for Privacy-Sensitive Ubiquitous Computing By Jason I-An Hong BS (Georgia Institute of Technology) 1997 | |
| Arabo et al. | Context-aware identity management in pervasive ad-hoc environments | |
| Smith et al. | A social approach to privacy in location-enhanced computing | |
| Tatli et al. | Mobile identity management revisited | |
| Egeland | Privacy handling in context dissemination | |
| Tang | “Sometimes Less is More”: Multi-Perspective Exploration of Disclosure Abstractions in Location-Aware Social Mobile Applications |