The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the wide spread usage of LBS, convenience has reached on the finger tips of mobile users, but on the other side, it has escalated many security and privacy concerns. In this paper we address the location K-anonymity problem using fuzzy spatio-temporal attributes, a new perspective of looking at privacy issue in location privacy. In the context of LBSs and mobile clients, location K-anonymity...
With the rapid development of mobile internet and pervasion of Location-Based Service (LBS), location privacy has become an important issue. In this paper, we present DeCache, a modified location privacy protection system model, which pre-caches the user-demanded LBS data. So the mobile users don't have to send the network LBS requests when they need to access LBS. This is more secure than the previous...
The increasing trend of embedding positioning capabilities (e.g., GPS) in mobile devices facilitates the widespread use of Location Based Services. For such applications to succeed, privacy and confidentiality are key issues. Over all privacy will have to be managed through a combination of technology, legislation, corporate policy, and social norms. There are many data privacy schemes including Zero...
This paper describes the CloudProtect middleware that empowers users to encrypt sensitive data stored within various cloud applications. However, most web applications require data in plaintext for implementing the various functionalities and in general, do not support encrypted data management. Therefore, CloudProtect strives to carry out the data transformations (encryption/decryption) in a manner...
Federated Identity Management Systems (IMS) is a promising system where an increasing number of e-services will be made available in the future for users' convenience. However in this environment, users are required to manage several identities (ID cards) and a great number of personal data. As such, simplification of users' involvement is highly needed while increasing the users' confidence, and...
Mobile users traveling over roads often issue KNN queries based on their current locations with their mobile terminals (e.g. where is the nearest gas station?). However, exact location information transmitted to an unsecure server will easily lead the mobile user to be tracked. Thus it is important to protect mobile users' location privacy while providing location-based services. People traveling...
Under service oriented architecture (SOA), a system- such as an enterprise-consists of multiple heterogeneous servers (service providers), which may be distributed over a wide area of network, and may be managed under different administrative domains. One of the goals of this work is to enable the system as a whole (i.e., the enterprise) to impose global constraints on the interactive behavior of...
Location privacy in Location Based Services (LBS) is the ability to protect the association between user's identity, query sources, servers and database, thereby preventing an imminent attacker from easily linking users of LBS to certain locations. This paper studies recent schemes designed to offer location privacy and anonymity to LBS users. The main idea is to solve current practical problem by...
Protecting privacy of mobile users of location-based services is a currently interesting research problem. Most protection techniques can be categorized into either those providing location privacy or those guaranteeing k-anonymity. A mobile user (i) has location privacy if, when he makes an LBS request, adversaries cannot tell his location precise enough to cause privacy concerns, and (ii) has k-anonymity...
Recent research on remote health monitoring solutions has focused largely on developing context-dependent, streamprocessing capabilities on a personal mobile hub (typically, a cellphone) for energy-efficient transmission of data collected from a set of body-worn medical sensors. In this paper, we argue that commercial deployment of such pervasive wellness monitoring will require the extension of such...
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware computing. This paper describes our experiences in building a middleware component, the context privacy engine (CPE), that enforces a role-based, context-dependent privacy model for enterprise domains. While fundamentally an ACL-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.