Semantic-based privacy settings negotiation and management
By 2020, an individual is expected to own an average of 6.58 devices that share and
integrate a wealth of personal user data. The management of privacy preferences across …
integrate a wealth of personal user data. The management of privacy preferences across …
Privacy-knowledge modeling for the internet of things: A look back
Together, the Internet of Things (IoT) and cloud computing give us the ability to gather,
process, and even trade data to better understand users' behaviors, habits, and preferences …
process, and even trade data to better understand users' behaviors, habits, and preferences …
Data security mechanism based on hierarchy analysis for Internet of Things
W Jun, M Lei, Z Luo - Proceedings of the 2011 international conference …, 2011 - dl.acm.org
Internet of Things (IoT) is as a new generation of network service platform which could make
everything connected to the global network connection. From the viewpoint of data analysis …
everything connected to the global network connection. From the viewpoint of data analysis …
Privacy management for global organizations
S Pearson, T Sander, R Sharma - International Workshop on Data Privacy …, 2009 - Springer
In this paper we look at the complex area of a global outsourcing delivery model among
different countries and/or organizations. In this case, privacy requirements stemming from …
different countries and/or organizations. In this case, privacy requirements stemming from …
Quantizing personal privacy in ubiquitous computing
Privacy is one of the most important and difficult research issues in ubiquitous computing. It
is qualitative rather than quantitative. Privacy preserving mainly relies on policy based rules …
is qualitative rather than quantitative. Privacy preserving mainly relies on policy based rules …
Privacy preserving in ubiquitous computing: Classification & hierarchy
In this paper, we adopt the classification of personal information and hierarchy of services to
build a privacy system, in which one communicates with each other via pipes with different …
build a privacy system, in which one communicates with each other via pipes with different …
A new data aggregation model for intelligent transportation system
J Wu, L Zhong - Advanced Materials Research, 2013 - Trans Tech Publ
Intelligent Transportation System is a new kind of complicated information system which
includes many different wireless sensors. With the development in sensor technologies and …
includes many different wireless sensors. With the development in sensor technologies and …
[PDF][PDF] Trust based privacy protection method in pervasive computing
F Gao, J He, S Ma - Journal of Networks, 2012 - Citeseer
In pervasive computing environments, resources and services are usually provided by a
variety of different suppliers with multiple computing devices and from heterogeneous …
variety of different suppliers with multiple computing devices and from heterogeneous …
A Framework to Support Users' Privacy Preferences in the Proliferation of IoT
OR Sanchez - 2019 - tesidottorato.depositolegale.it
In the proliferation of personal IoT devices, the need for privacy protection becomes an
increasing concern. User's privacy preferences are not being respected in today's complex …
increasing concern. User's privacy preferences are not being respected in today's complex …
Privacy Management for Global Organizations
TS Siani Pearson, R Sharma - … St. Malo, France, September 24-25 …, 2010 - books.google.com
In this paper we look at the complex area of a global outsourcing delivery model among
different countries and/or organizations. In this case, privacy requirements stemming from …
different countries and/or organizations. In this case, privacy requirements stemming from …