This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in data privacy area, the presenter descr...
详细信息
ISBN:
(纸本)9781595936493
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in data privacy area, the presenter describes the essential concepts, the alternative models, and the suite of techniques for providing location privacy in mobile and ubiquitous data management systems. The tutorial consists of two main components. First, we will introduce location privacy threats and give an overview of the state of art research in data privacy and analyze the applicability of the existing data privacy techniques to location privacy problems. Second, we will present the various location privacy models and techniques effective in either the privacy policy based framework or the location anonymization based framework. The discussion will address a number of important issues in both data privacy and location privacy research, including the location utility and location privacy trade-offs, the need for a careful combination of policy-based location privacy mechanisms and location anonymization based privacy schemes, as well as the set of safeguards for secure transmission, use and storage of location information, reducing the risks of unauthorized disclosure of location information. The tutorial is designed to be self-contained, and gives the essential background for anyone interested in learning about the concept and models of location privacy, and the principles and techniques for design and development of a secure and customizable architecture for privacy-preserving mobile data management in mobile and pervasive information systems. This tutorial is accessible to data management administrators, mobile location based service developers, and graduate students and researchers who are interested in data management in mobile information syhhhstems, pervasive computing, and data privacy. Copyright 2007 VLDB Endowment, ACM.
Applications like weather forecasting and prediction, health-care monitoring, habitat monitoring, tsunami-warning systems, demand integration of Wireless Sensor networks (WSNs) with grids. The issues that need to be a...
详细信息
this paper describes a fast dynamic authentication and authorization (DAA) scheme among the inter-domains, based on virtual identity concept which is used to protect privacy and integrity of user personal data. In the...
详细信息
this paper describes a fast dynamic authentication and authorization (DAA) scheme among the inter-domains, based on virtual identity concept which is used to protect privacy and integrity of user personal data. In the inter-domain, federation concept is introduced and applied, which federation states the trust relationship among different domains at deferent levels. A common framework to coordinate authentication, authorization and personal user information across different federated inter-domains is established, which authentication and authorization processes are clearly separated implemented via single sign on (SSO). Diameter protocol is used to exchange authentication and authorization assertions across inter-domains and different AAA (Authentication, Authorization and Accounting) solutions to realize services grouping management. Furthermore, bootstrapping approach is used to ensure security of the user information to access an opened and distributed communication networks.
The concept of the Sagnac effect in a slow-light medium and resonator structure with a high group dispersion is investigated. It is found that a slow-light medium can be utilized for relative motion sensing, and a slo...
详细信息
We study optimal operating conditions for 160-Gb/s signals traversing a slow-light delay line based on parametric amplification. Six phase modulated formats are investigated, including CSRZ, PAP-CSRZ, GAP-CSRZ, RZ duo...
详细信息
One task-flow scheduler has been designed to optimally allocate resources for a task-flow based Aircraft Collab.rative Design Application in Optical Grid. This scheduler and application has been deployed on an Optical...
详细信息
ISBN:
(纸本)9783800730421
One task-flow scheduler has been designed to optimally allocate resources for a task-flow based Aircraft Collab.rative Design Application in Optical Grid. This scheduler and application has been deployed on an Optical Grid testbed. The application's practical running demonstrates its feasibility.
In this paper we describe the design, implementation, and analytical background of the DISCO Network Calculator. The DISCO Network Calculator is an open-source toolbox written in Java#8482;which we developed for worst...
详细信息
ISBN:
(纸本)1595935045
In this paper we describe the design, implementation, and analytical background of the DISCO Network Calculator. The DISCO Network Calculator is an open-source toolbox written in Java#8482;which we developed for worst-case analyses based on network calculus. To our knowledge it is the first of its kind. It allows to do network analyses regarding performance characteristics such as delay and backlog bounds for piecewise linear arrival and service curves. We illustrate the tool's usefulness by two comprehensive example applications. Copyright 2006 ACM.
Network calculus is a min-plus system theory which facilitates the efficient derivation of performance bounds for networks of queues. It has successfully been applied to provide end-to-end quality of service guarantee...
详细信息
ISBN:
(纸本)1595933204
Network calculus is a min-plus system theory which facilitates the efficient derivation of performance bounds for networks of queues. It has successfully been applied to provide end-to-end quality of service guarantees for integrated and differentiated services networks. Yet, a true end-to-end analysis including the various components of end systems as well as taking into account mid-boxes like firewalls, proxies, or media gateways has not been accomplished so far. The particular challenge posed by such systems are transformation processes, like data processing, compression, encoding, and decoding, which may alter data arrivals drastically. The heterogeneity, which is reflected in the granularity of operation, for example multimedia applications process video frames which, however, are represented by packets in the network, complicates the analysis further. To this end this paper evolves a concise network calculus with scaling functions, which allow modelling a wide variety of transformation processes, Combined with the concept of packetizer this theory enables a true end-to-end analysis of distributedsystems. Copyright 2006 ACM.
Along with the increasing diversity of educational markup languages there is a strong need for flexible integration of such content into learning platforms. Therefore, we have identified four basic mechanisms: plain l...
详细信息
As research in context recognition moves towards more maturity and real life applications, appropriate and reliable performance metrics gain importance. This paper focuses on the issue of performance evaluation in the...
暂无评论