This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Security and Privacy in Pervasive Computing
October-December 2007 (vol. 6 no. 4)
pp. 73-75
Charalampos Patrikakis, National Technical University of Athens
Pantelis Karamolegkos, National Technical University of Athens
Athanasios Voulodimos, National Technical University of Athens
Mohd Helmy Abd Wahab, Universiti Tun Hussein Onn Malaysia
Nik Shahidah Afifi Mohd Taujuddin, Universiti Tun Hussein Onn Malaysia
Christina Hanif, Universiti Tun Hussein Onn Malaysia
Linda Pareschi, University of Milan
Daniele Riboni, University of Milan
Stefan G. Weber, Technische Universität Darmstadt
Andreas Heinemann, Technische Universität Darmstadt
Sen-ching Samson Cheung, University of Kentucky
Jayahsri Chaudhari, University of Kentucky
Jithendra K. Paruchuri, University of Kentucky
This Works in Progress department features six projects relating to security and privacy. The first two entries address an individual's privacy concerns and preferences. The next discusses a project on data protection for electronic passports. The remaining three entries investigate various types of privacy protection mechanisms for data collected in pervasive computing environments, by attestation services, and by voice recording systems. This department is part of a special issue on security and privacy.

1. J. Chaudhari, S.-c. Cheung, and M.V. Venkatesh, "Privacy Protection for Life-Log Video," Proc. IEEE Workshop Signal Processing Applications for Public Security and Forensics, IEEE Press, 2007, pp. 1–5; www.vis.uky.edu/~cheung/docsafe07.pdf.
2. L. Sweeney, "K-anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems, vol. 10, no. 5, 2002, pp. 557–570.

Index Terms:
pervasive computing, privacy, security, technology awareness, user needs, context-aware mobile services, encryption, electronic data, e-passport, sensing technology, k-anonymity techniques, attestation services, speaker identification, pitch shifting, voice morphing
Citation:
Charalampos Patrikakis, Pantelis Karamolegkos, Athanasios Voulodimos, Mohd Helmy Abd Wahab, Nik Shahidah Afifi Mohd Taujuddin, Christina Hanif, Linda Pareschi, Daniele Riboni, Stefan G. Weber, Andreas Heinemann, Sen-ching Samson Cheung, Jayahsri Chaudhari, Jithendra K. Paruchuri, "Security and Privacy in Pervasive Computing," IEEE Pervasive Computing, vol. 6, no. 4, pp. 73-75, Oct.-Dec. 2007, doi:10.1109/MPRV.2007.86
Usage of this product signifies your acceptance of the Terms of Use.