Shanmugarasa et al., 2021 - Google Patents
Towards automated data sharing in personal data storesShanmugarasa et al., 2021
View PDF- Document ID
- 14779115431459194370
- Author
- Shanmugarasa Y
- Paik H
- Kanhere S
- Zhu L
- Publication year
- Publication venue
- 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)
External Links
Snippet
The data on the Web is increasingly being centralised towards a few service providers. Personal Data Stores (PDS) have emerged, proposing a fundamental shift from the current service-centric data ecosystem to a decentralised data storage and processing environment …
- 230000000694 effects 0 description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30017—Multimedia data retrieval; Retrieval of more than one type of audiovisual media
- G06F17/30023—Querying
- G06F17/30029—Querying by filtering; by personalisation, e.g. querying making use of user profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/445—Programme loading or initiating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10956586B2 (en) | Personalized privacy assistant | |
Sadeh et al. | Understanding and capturing people’s privacy policies in a mobile social networking application | |
Sanchez et al. | A recommendation approach for user privacy preferences in the fitness domain | |
Elahi et al. | A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities | |
Villela et al. | Towards ubiquitous RE: A perspective on requirements engineering in the era of digital transformation | |
Shanmugarasa et al. | Towards automated data sharing in personal data stores | |
Kapitsaki | Reflecting user privacy preferences in context-aware web services | |
Korobiichuk et al. | The method of semantic structuring of virtual community content | |
Bumiller et al. | On understanding context modelling for adaptive authentication systems | |
Abirami et al. | Performance analysis of the dynamic trust model algorithm using the fuzzy inference system for access control | |
Dehling et al. | A design theory for transparency of information privacy practices | |
Nakamura et al. | Easing the burden of setting privacy preferences: A machine learning approach | |
Shanmugarasa et al. | Automated privacy preferences for smart home data sharing using personal data stores | |
Vahabli et al. | A novel trust-based access control for social networks using fuzzy systems | |
Ji et al. | Scrutinizing algorithms: assessing journalistic role performance in Chinese news media’s coverage of Artificial Intelligence | |
Lederer | Designing Disclosure: Interactive Personal privacy at the Dawn of ubiquitous computing | |
Oglaza et al. | A new approach for managing Android permissions: learning users’ preferences | |
EP3732607A1 (en) | Personalized privacy assistant | |
Araújo et al. | Service discovery based on social profiles of objects in a social iot network | |
Chen et al. | A privacy settings prediction model for textual posts on social networks | |
Westerlund | A study of EU data protection regulation and appropriate security for digital services and platforms | |
Behrendt et al. | Business Intelligence 2.0 | |
Hu et al. | Roaming across the castle tunnels: An empirical study of inter-app navigation behaviors of Android users | |
Carvalho et al. | Catalog of invisibility correlations for UbiComp and IoT applications | |
Wijesundara | Privacy-aware Smart Home Interface Framework |