Search For:

Displaying 1-19 out of 19 total
Must social networking conflict with privacy?
Found in: IEEE Security & Privacy
By Jonathan Anderson,Frank Stajano
Issue Date:May 2013
pp. 51-60
Online social networks have serious privacy drawbacks, some of which stem from the business model. Must this be? Is the current OSN business model the only viable one? Or can we construct alternatives that are technically and economically feasible?
 
Multichannel Security Protocols
Found in: IEEE Pervasive Computing
By Ford Long Wong, Frank Stajano
Issue Date:October 2007
pp. 31-39
Many security protocols were designed to run over inherently insecure channels such as ad hoc radio or the packet-switched Internet. However, they can be strengthened with additional transmissions over other lower-capacity channels, commonly found in ubico...
 
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Found in: Communication Networks and Services Research, Annual Conference on
By Ford Long Wong, Min Lin, Shishir Nagaraja, Ian Wassell, Frank Stajano
Issue Date:May 2007
pp. 157-165
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes? locations with high temporal and spatial accuracy, such that pseudonym changing and higher-layer o...
 
An Architecture for Interactive Context-Aware Applications
Found in: IEEE Pervasive Computing
By Kasim Rehman, Frank Stajano, George Coulouris
Issue Date:January 2007
pp. 73-80
The main difference between traditional HCI design and context-aware design is how each contends with context; any interaction model for the latter must address the question of what context is. Unlike desktop applications, the interactive behavior of conte...
 
Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Ford-Long Wong, Frank Stajano
Issue Date:March 2006
pp. 246-250
We consider group key agreement (GKA) protocols, used by a group of peers to establish a shared secret key for multicast communications. There has been much previous work to improve the security, efficiency and scalability of such protocols. In our work, w...
 
A Practical Approach for 4G Systems: Deployment of Overlay Networks
Found in: Testbeds and Research Infrastructures for the Development of Networks & Communities, International Conference on
By Pablo Vidales, Glenford Mapp, Frank Stajano, Jon Crowcroft, Carlos J. Bernardos
Issue Date:February 2005
pp. 172-181
Experimental activities play a vital role in the deployment and development of novel radio access networks. In particular the movement from 3G to 4G poses new challenges, which need to be solved using practical approaches such as testbeds. This paper prese...
 
Mix Zones: User Privacy in Location-aware Services
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Alastair R. Beresford, Frank Stajano
Issue Date:March 2004
pp. 127
Privacy of personal location information is becoming an increasingly important issue. This paper refines a method, called the mix zone, developed to enhance user privacy in location-based services. We improve the mathematical model, examine and minimise co...
 
Location Privacy in Pervasive Computing
Found in: IEEE Pervasive Computing
By Alastair R. Beresford, Frank Stajano
Issue Date:January 2003
pp. 46-55
<p>The authors protect location privacy using mix zones--a new construction comparable to the mix nodes used for anonymous communications. They discuss two quantitative location privacy metrics they developed based on mix zones and demonstrate their ...
 
The Resurrecting Duckling: Security Issues for Ubiquitous Computing (Supplement to Computer Magazine)
Found in: Computer
By Frank Stajano, Ross Anderson
Issue Date:April 2002
pp. 22-26
A common view of the Internet divides its history into three waves: originally, mainframes and terminals; until yesterday, PCs, browsers, and a GUI; starting tomorrow, wirelessly networked processors embedded in everyday objects.
 
Security Issues for Internet Appliances
Found in: Applications and the Internet Workshops, IEEE/IPSJ International Symposium on
By Frank Stajano, Hiroshi Isozaki
Issue Date:February 2002
pp. 18
Internet-connected consumer appliances, under a dedi-cated and simplified user interface, often contain fully func-tional computers, sometimes even based on standard soft-ware platforms and operating systems. These appliances are therefore vulnerable to th...
 
Technology Challenges for Building Internet-Scale Ubiquitous Computing
Found in: Object-Oriented Real-Time Dependable Systems, IEEE International Workshop on
By Tatsuo Nakajima, Hiro Ishikawa, Eiji Tokunaga, Frank Stajano
Issue Date:January 2002
pp. 0171
In the future, many of the physical objects that surround us will be augmented with microprocessors and wireless transceivers. They will communicate with each other, quietly monitor our daily activities and notify us of important events. Any piece of relev...
 
Understanding scam victims: seven principles for systems security
Found in: Communications of the ACM
By Frank Stajano, Paul Wilson, Paul Wilson
Issue Date:March 2011
pp. 70-75
Effective countermeasures depend on first understanding how users naturally fall victim to fraudsters.
     
Privacy in the era of genomics
Found in: netWorker
By Frank Stajano
Issue Date:December 2009
pp. 40-ff
A paranoid's look at advances in DNA research.
     
Privacy-enabling social networking over untrusted networks
Found in: Proceedings of the 2nd ACM workshop on Online social networks (WOSN '09)
By Claudia Diaz, Frank Stajano, Jonathan Anderson, Joseph Bonneau
Issue Date:August 2009
pp. 101-104
Current social networks require users to place absolute faith in their operators, and the inability of operators to protect users from malicious agents has led to sensitive private information being made public. We propose an architecture for social networ...
     
Privacy stories: confidence in privacy behaviors through end user programming
Found in: Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09)
By Frank Stajano, Joesph Bonneau, Jonathan Anderson, Luke Church
Issue Date:July 2009
pp. 1-32
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We want to understand what level of control users need o...
     
Eight friends are enough: social graph approximation via public listings
Found in: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems (SNS '09)
By Frank Stajano, Jonathan Anderson, Joseph Bonneau, Ross Anderson
Issue Date:March 2009
pp. 13-18
The popular social networking website Facebook exposes a "public view" of user profiles to search engines which includes eight of the user's friendship links. We examine what interesting properties of the complete social graph can be inferred from this pub...
     
RFID is x-ray vision
Found in: Communications of the ACM
By Frank Stajano
Issue Date:September 2005
pp. 31-33
In a world saturated with RFID tags, protecting the privacy of individuals is technically difficult. Without a proper alignment of interests it may be impossible.
     
Will your digital butlers betray you?
Found in: Proceedings of the 2004 ACM workshop on Privacy in the electronic society (WPES '04)
By Frank Stajano
Issue Date:October 2004
pp. 37-38
The cost of data storage is now so low that there is little necessity ever to delete anything. The consequence is <i>denied oblivion</i>---digital systems that remember forever and can be data-mined retroactively, years after the event, ignoring an...
     
Interfacing with the invisible computer
Found in: Proceedings of the second Nordic conference on Human-computer interaction (NordiCHI '02)
By Frank Stajano, George Coulouris, Kasim Rehman
Issue Date:October 2002
pp. 213-216
The Ubicomp scenario of wirelessly networked processors embedded in everyday objects has been dubbed "the invisible computer". Users no longer interact with a computer but with familiar objects whose functionality is transparently enhanced by computing fea...
     
 1