IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004
DOI: 10.1109/mdm.2004.1263065
|View full text |Cite
|
Sign up to set email alerts
|

Enabling context-aware and privacy-conscious user data sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
55
0

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 80 publications
(55 citation statements)
references
References 6 publications
0
55
0
Order By: Relevance
“…However, the richness and dynamics of contextual situations that may occur in pervasive and mobile computing environments claim for the definition of formal languages to express complex conditions on a multitude of context data, as well as sufficiently expressive languages to represent the context itself. To this aim, Houdini [28] provides a comprehensive formal framework to represent dynamic context data, integrate them from heterogeneous sources, and share context information on the basis of users' privacy policies. In particular, privacy policies can be expressed considering the context of the data owner (i.e., the user) and the context of the subject.…”
Section: Network and Cryptographic Protocolsmentioning
confidence: 99%
“…However, the richness and dynamics of contextual situations that may occur in pervasive and mobile computing environments claim for the definition of formal languages to express complex conditions on a multitude of context data, as well as sufficiently expressive languages to represent the context itself. To this aim, Houdini [28] provides a comprehensive formal framework to represent dynamic context data, integrate them from heterogeneous sources, and share context information on the basis of users' privacy policies. In particular, privacy policies can be expressed considering the context of the data owner (i.e., the user) and the context of the subject.…”
Section: Network and Cryptographic Protocolsmentioning
confidence: 99%
“…The Houdini framework [4] focuses on the expression and enforcement of individual privacy preferences in a cellular network. One of Houdini's innovations is the use of Web-based forms for defining various generic activity-oriented context attributes, based on a combination of raw location and time data.…”
Section: Related Workmentioning
confidence: 99%
“…The CPE privacy model specifies not only who can access what data, but also for what purpose and under what context. A variety of prior work (e.g., [3] [4]) has explored the use of ACL-based privacy systems. However, CPE addresses unique challenges specific to a large enterprise domain where large number of concurrent access is a requirement.…”
Section: Introductionmentioning
confidence: 99%
“…In some of our past work, we had assumed that the user would provision preferences (targeted toward a single application), which along with other subscriber data could then be interpreted at run time by a high-speed Alcatel-Lucent Vortex ® [11] rules engine to personalize the application behavior. Though useful, this puts an undue burden on the user; the user needs to provision his preferences explicitly and keep them up-to-date as his habits and intentions change.…”
Section: Introductionmentioning
confidence: 99%