UPEM : user-centered privacy evaluation model in pervasive computing system.
The fact that pervasive systems are typically embedded and invisible, making it difficult for users to know when these devices are collecting data. Consequently privacy appears as a major issue for persuasive computing applications and several privacy models proposed for pervasive environments. The...
| Main Authors: | Dehghantanha, Ali, Mahmod, Ramlan, Udzir, Nur Izura, Ahmad Zulkarnain, Zuriati |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Ubiquitous Computing and Communication Journal (UbiCC Journal)
2009
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/12894/ http://psasir.upm.edu.my/id/eprint/12894/1/UPEM.pdf |
Similar Items
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Xml-Based Privacy Model in Pervasive Computing
by: Dehghantanha, Ali
Published: (2008)
by: Dehghantanha, Ali
Published: (2008)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
User-centered evaluation of privacy models for protecting personal medical information
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
Measuring usability of electronic Quran mobile application in pervasive computing environments: user profiling
by: Abd Ghani, Nur Nina Syazwani, et al.
Published: (2017)
by: Abd Ghani, Nur Nina Syazwani, et al.
Published: (2017)
A survey on privacy impacts of digital investigation
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)
by: Shah, Asadullah
Published: (2015)
Mobile and pervasive computing in construction: An introduction
by: Anumba, C., et al.
Published: (2012)
by: Anumba, C., et al.
Published: (2012)
Privacy-respecting digital investigation
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
Primitive structural method for high capacity text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2014)
by: Roslan, Nuur Alifah, et al.
Published: (2014)
Enabling security for service discovery in pervasive computing environments
by: Sharifi, Mahdi
Published: (2009)
by: Sharifi, Mahdi
Published: (2009)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Understanding mass participatory pervasive computing systems for environmental campaigns
by: Chamberlain, Alan, et al.
Published: (2014)
by: Chamberlain, Alan, et al.
Published: (2014)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
A Context-Aware Based Authorization
System For Pervasive Grid Computing
by: Lim , Marilyn Chien Hui
Published: (2015)
by: Lim , Marilyn Chien Hui
Published: (2015)
A context-aware authentication method using blockchain for pervasive computing
by: Ng, Miao Xuan
Published: (2021)
by: Ng, Miao Xuan
Published: (2021)
A user profile for information filtering using RFID-SIM card in pervasive network
by: Osman, A.A., et al.
Published: (2011)
by: Osman, A.A., et al.
Published: (2011)
Smart-contract privacy preservation mechanism
by: Siraj, Muhammed, et al.
Published: (2023)
by: Siraj, Muhammed, et al.
Published: (2023)
Pervasive Multimedia for Autism Intervention
by: Venkatesh, Svetha, et al.
Published: (2012)
by: Venkatesh, Svetha, et al.
Published: (2012)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
Privacy Perceptions of Twitter Users in Saudi Arabia.
by: ALAMR, BADR
Published: (2018)
by: ALAMR, BADR
Published: (2018)
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019)
by: Salji, Mohd Rafiz, et al.
Published: (2019)
Enhancing privacy of paging procedure in LTE
by: Muthana, Abdulrahman, et al.
Published: (2018)
by: Muthana, Abdulrahman, et al.
Published: (2018)
The multimedia challenges raised by pervasive games
by: Capra, Mauricio, et al.
Published: (2005)
by: Capra, Mauricio, et al.
Published: (2005)
Pervasive Web Mapping, Geoprocessing and Services
by: Dragicevic, S., et al.
Published: (2011)
by: Dragicevic, S., et al.
Published: (2011)
A continuous Region-based Skyline computation for A Group of Mobile Users
by: Dehaki, Ghoncheh Babanejad, et al.
Published: (2022)
by: Dehaki, Ghoncheh Babanejad, et al.
Published: (2022)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Gaming tourism: Lessons from evaluating REXplorer, a pervasive game for tourists
by: Ballagas, R., et al.
Published: (2008)
by: Ballagas, R., et al.
Published: (2008)
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)
by: Halboob, Waleed Abduljabbar
Published: (2015)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
by: Abd Aziz, Norazah, et al.
Published: (2014)
by: Abd Aziz, Norazah, et al.
Published: (2014)
Routes and requirements for realizing pervasive medical devices
by: Craven, Michael P.
Published: (2006)
by: Craven, Michael P.
Published: (2006)
Urban Malays` User-Behaviour and Perpective on Privacy and Spatial Organization of Housing
by: Hashim, Ahmad Hariza, et al.
Published: (2009)
by: Hashim, Ahmad Hariza, et al.
Published: (2009)
Similar Items
-
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009) -
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009) -
Xml-Based Privacy Model in Pervasive Computing
by: Dehghantanha, Ali
Published: (2008) -
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015) -
User-centered evaluation of privacy models for protecting personal medical information
by: Samsuri, Suhaila, et al.
Published: (2011)