The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the popularization of human-carried devices, it is possible for Mobile Crowd Sensing (MCS) applications to perform large scale sensing with sensors embedded in these devices. Many incentive mechanisms for MCS applications have been proposed due to the importance of attracting more worker to participate. However, these mechanisms failed to consider situations where there are constraints on both...
We propose a novel IoT directory service for storing, updating, and providing records of mobile IoT devices or objects. The IoT directory service is designed to manage a massive number of records (about one billion) and support fast lookup (latency of less than 10ms). It performs proactive caching of the records in various replicas (following the movement of mobile IoT devices or application clients)...
Mobile crowdsensing enables individuals to collect data from social events and phenomena for performing tasks released by customers using their mobile devices. It removes the necessity of sensors deployment and hence supports large-scale sensing applications efficiently. Nevertheless, incentive and privacy remain as the major obstacles that need additional attention. If privacy is not presered or...
Offloading has emerged as a promising idea to allow resource-constrained mobile devices to access intensive applications, without performance or energy costs, by leveraging external computing resources. This could be particularly useful in enterprise contexts where running line-of-business applications on mobile devices can enhance enterprise operations. However, we must address three practical roadblocks...
Data sharing and privacy protection of mobile users have always been a challenge to research and development, as well as commercial and enterprise deployment of the Global Positioning System (GPS) and location-based mobile applications. The concepts of k-anonymity, two spatial cloaking algorithms — Nearest Neighbor Cloak (NNC) and Hilbert Cloak (HC) — that utilize k-anonymity, as well as user density's...
This paper presents our research on secure and accurate targeted mobile coupon delivery. Our goal is to enable the secure delivery of targeted coupons to eligible users equipped with mobile devices, whose behavioral profiles accurately satisfy the targeting profile defined by the vendor. Our design well preserves user privacy, and further provides the strict security guarantee of vendor protection,...
Millions of users a day using location-based social network applications such as Foursquare, Facebook Place, or Google+ to find, share or check-in their locations or point of interest to friends. However, the position may have been disclosed to other people who might not be fully trusted, and those people may be malicious stalkers. To obscure the user location, this paper proposes a novel location...
The large-scale access to content resources, the current change in the audience expectations, together with an underuse of the potentialities offered by mobile technology calls for a rethinking of the role of mobile interpretation within private and public business manager. Right in the in the area of intersection between business innovation and technology moves the paper, which deals, with the role...
Spatial cloaking has been proposed and studied to protect mobile user privacy when using location based services (LBS). Traditional spatial cloaking methods are carried out by a trusted proxy known as location trusted server (LTS) to generate a region that contains at least k users for every request. The LTS is assumed to know the location of all users at all times, and perform the cloaking for all...
The use of geographical information about users is the main quality of Location Based Services (LBS). Services like finding routes between places or finding friends can offer benefits and facilities. However, the misuse of location information can raise some threats to the user's privacy. We present the Location Privacy Based System (LPBS), a system that guarantees LBS execution with privacy relying...
The following topics are dealt with: grid and cluster computing; performance evaluation and measurement; architectures and systems; wireless and mobile communications; network communications; security and privacy; reliability and fault tolerance; data mining and caching; AHPCN; multicore and multithreaded architectures and programming; network storage and data management; and parallel algorithm and...
This paper addresses issues of service access, and policies to control access to these services. It introduces the mobile phone as a service aggregator and control centre for sensor networks. Semantic policies are used to extend the encryption-based radio link protection by an application layer protection. Two scenarios are introduced, covering home access and content access in the home. The implementation...
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
The research project aims at designing and implementing a Web based wireless mobile system security and privacy framework that is centered on the concepts of ubiquitous healthcare services provided to the patients in rural or remote areas from distant hospitals. With this system framework, a physician can securely access and carry the patient information from a mobile device, update the patient information...
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.