A XML based, user-centered privacy model in pervasive computing systems
The fact that pervasive systems are typically embedded and invisible makes it difficult for users to know when, where, and how these devices are collecting data. So privacy is a major issue for pervasive computing applications and several privacy models have been proposed for pervasive environments...
| Main Authors: | Dehghantanha, Ali, Mahmod, Ramlan, Udzir, Nur Izura |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/12897/ http://psasir.upm.edu.my/id/eprint/12897/1/A%20XML%20based.pdf |
Similar Items
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Xml-Based Privacy Model in Pervasive Computing
by: Dehghantanha, Ali
Published: (2008)
by: Dehghantanha, Ali
Published: (2008)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Mobile and pervasive computing in construction: An introduction
by: Anumba, C., et al.
Published: (2012)
by: Anumba, C., et al.
Published: (2012)
Computer games for user engagement in attention deficit hyperactivity disorder (ADHD) monitoring and therapy
by: Craven, Michael P., et al.
Published: (2015)
by: Craven, Michael P., et al.
Published: (2015)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
A work service model of the ubiquitous environment for collaboration
by: Lee, J., et al.
Published: (2012)
by: Lee, J., et al.
Published: (2012)
Understanding mass participatory pervasive computing systems for environmental campaigns
by: Chamberlain, Alan, et al.
Published: (2014)
by: Chamberlain, Alan, et al.
Published: (2014)
Human-sensor dialogue in participatory sensing
by: Paxton, Mark Christopher
Published: (2009)
by: Paxton, Mark Christopher
Published: (2009)
Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments
by: Wietrzyk, Bartosz, et al.
Published: (2007)
by: Wietrzyk, Bartosz, et al.
Published: (2007)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)
by: Halboob, Waleed Abduljabbar
Published: (2015)
The Timestreams platform: artist mediated participatory sensing for environmental discourse
by: Blum, Jesse, et al.
Published: (2013)
by: Blum, Jesse, et al.
Published: (2013)
The spatial character of sensor technology
by: Reeves, Stuart, et al.
Published: (2006)
by: Reeves, Stuart, et al.
Published: (2006)
Factors influencing utilisation of ubiquitous technology among undergraduates in Malaysian Technical Universities
by: Sedek, Muliati
Published: (2014)
by: Sedek, Muliati
Published: (2014)
Lost in SPACES: exploring the benefits and shortcomings of spatial presence and awareness as a mechanism for context reasoning
by: Coverdale, S
Published: (2016)
by: Coverdale, S
Published: (2016)
Living with the user: design drama for dementia care through responsive scripted experiences in the home
by: Coughlan, Tim, et al.
Published: (2014)
by: Coughlan, Tim, et al.
Published: (2014)
From privacy impact assessment to Social Impact Assessment
by: Edwards, Lilian, et al.
Published: (2016)
by: Edwards, Lilian, et al.
Published: (2016)
Enabling security for service discovery in pervasive computing environments
by: Sharifi, Mahdi
Published: (2009)
by: Sharifi, Mahdi
Published: (2009)
RTPD/MACSC: a novel approach for effective pervasive information retrieval
by: Wu, R., et al.
Published: (2005)
by: Wu, R., et al.
Published: (2005)
Understanding receptivity to interruptions in mobile human-computer interaction
by: Fischer, Joel
Published: (2011)
by: Fischer, Joel
Published: (2011)
Controlling label size increment of efficient XML encoding and labeling scheme in dynamic XML update
by: Mirabi, Meghdad, et al.
Published: (2010)
by: Mirabi, Meghdad, et al.
Published: (2010)
Enhanced cuckoo malware analysis performance using cloud computing
by: Barakat, Osamah Lutf Hamood
Published: (2013)
by: Barakat, Osamah Lutf Hamood
Published: (2013)
Weaving healthy behaviors into new technology routines: Designing in (and for) the COVID-19 work-from-home period
by: Ren, Xipei, et al.
Published: (2020)
by: Ren, Xipei, et al.
Published: (2020)
A Context-Aware Based Authorization
System For Pervasive Grid Computing
by: Lim , Marilyn Chien Hui
Published: (2015)
by: Lim , Marilyn Chien Hui
Published: (2015)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Evaluation of XML documents queries based on native XML database
by: Lazim, Raghad Yaseen
Published: (2016)
by: Lazim, Raghad Yaseen
Published: (2016)
Managing obesity through mobile phone applications: a state-of-the-art review from a user-centred design perspective
by: Hermawati, Setia, et al.
Published: (2014)
by: Hermawati, Setia, et al.
Published: (2014)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Making ubicomp acceptable in the home
by: Martinez Reyes, Fernando
Published: (2009)
by: Martinez Reyes, Fernando
Published: (2009)
Emerging sensor-cloud technology for pervasive services and applications
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
The Design of Flexible Pervasive Electronic Health Record (PEHR)
by: Abd Ghani, M. K., et al.
Published: (2011)
by: Abd Ghani, M. K., et al.
Published: (2011)
Unsupervised labelling of sequential data for
location identification in indoor environments
by: Pérez López, Iker, et al.
Published: (2016)
by: Pérez López, Iker, et al.
Published: (2016)
A model for controlling access to XML documents.
by: Rahman, Kh. Azizur, et al.
Published: (2003)
by: Rahman, Kh. Azizur, et al.
Published: (2003)
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
A research framework for user centered web development
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
Similar Items
-
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009) -
Xml-Based Privacy Model in Pervasive Computing
by: Dehghantanha, Ali
Published: (2008) -
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009) -
Mobile and pervasive computing in construction: An introduction
by: Anumba, C., et al.
Published: (2012) -
Computer games for user engagement in attention deficit hyperactivity disorder (ADHD) monitoring and therapy
by: Craven, Michael P., et al.
Published: (2015)