Security in Pervasive Computing
Title | Security in Pervasive Computing PDF eBook |
Author | John A. Clark |
Publisher | Springer Science & Business Media |
Pages | 252 |
Release | 2006-04-10 |
Genre | Computers |
ISBN | 3540333762 |
This book constitutes the refereed proceedings of the Third International Conference on Security in Pervasive Computing, SPC 2006, held in York, UK, in April 2006. The 16 revised papers presented together with the extended abstract of 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on protocols, mechanisms, integrity, privacy and security, information flow and access control, and authentication.
Location- and Context-Awareness
Title | Location- and Context-Awareness PDF eBook |
Author | Mike Hazas |
Publisher | Springer Science & Business Media |
Pages | 298 |
Release | 2006-05-05 |
Genre | Computers |
ISBN | 3540341501 |
This book constitutes the refereed proceedings of the Second International Workshop on Location- and Context-Awareness, LoCA 2006, held in Dublin, Ireland, in May 2006. The 18 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 74 submissions. The papers are organized in topical sections on location sensing, mapping, privacy and access, context sensing, social context, representation and programming.
Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives
Title | Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives PDF eBook |
Author | Godara, Varuna |
Publisher | IGI Global |
Pages | 412 |
Release | 2008-10-31 |
Genre | Computers |
ISBN | 1605662216 |
Provides extensive information about pervasive computing and its implications from various perspectives so that current and future pervasive service providers can make responsible decisions about where, when and how to use this technology.
Handbook of Research on Wireless Security
Title | Handbook of Research on Wireless Security PDF eBook |
Author | Yan Zhang |
Publisher | IGI Global |
Pages | 860 |
Release | 2008-01-01 |
Genre | Technology & Engineering |
ISBN | 1599049007 |
Provides research on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security.
Handbook of Mobile Data Privacy
Title | Handbook of Mobile Data Privacy PDF eBook |
Author | Aris Gkoulalas-Divanis |
Publisher | Springer |
Pages | 426 |
Release | 2018-10-26 |
Genre | Computers |
ISBN | 3319981617 |
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.
Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications
Title | Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications PDF eBook |
Author | Symonds, Judith |
Publisher | IGI Global |
Pages | 1868 |
Release | 2009-09-30 |
Genre | Computers |
ISBN | 160566961X |
"This publication covers the latest innovative research findings involved with the incorporation of technologies into everyday aspects of life"--Provided by publisher.
UbiComp 2007: Ubiquitous Computing
Title | UbiComp 2007: Ubiquitous Computing PDF eBook |
Author | John Krumm |
Publisher | Springer Science & Business Media |
Pages | 537 |
Release | 2007-09-06 |
Genre | Computers |
ISBN | 3540748520 |
This book constitutes the refereed proceedings of the 9th International Conference on Ubiquitous Computing, UbiComp 2007. It covers all current issues in ubiquitous, pervasive and handheld computing systems and their applications, including tools and techniques for designing, implementing, and evaluating ubiquitous computing systems; mobile, wireless, and ad hoc networking infrastructures for ubiquitous computing; privacy, security, and trust in ubiquitous and pervasive systems.