- Publication Details
-
- IEEE ISM 2013
- Dec December 9, 2013
Publications
From 2013 (Clear Search)
“Notice: FX Palo Alto Laboratory will be closing. All Research and related operations will cease as of June 30, 2020.”
- Publication Details
-
- Education and Information Technologies journal
- Oct October 11, 2013
Abstract
Close- Publication Details
-
- Interactive Tabletops and Surfaces (ITS) 2013
- Oct October 6, 2013
Abstract
Close- Publication Details
-
- ACM Trans. On Multimedia Computing, Communications and Applications (TOMCCAP)
- Oct October 1, 2013
Abstract
Close- Publication Details
-
- DocEng 2013
- Sep September 10, 2013
Abstract
Close- Publication Details
-
- CBDAR 2013
- Aug August 23, 2013
Abstract
Close- Publication Details
-
- EuroHCIR 2013
- Aug August 1, 2013
Abstract
Close- Publication Details
-
- SIGIR 2013
- Jul July 28, 2013
Abstract
Close- Publication Details
-
- The International Symposium on Pervasive Displays
- Jun June 4, 2013
Abstract
Close- Publication Details
-
- Future Generation Computer Systems
- May May 28, 2013
Abstract
CloseCollaboration technologies must support information sharing between collaborators, but must also take care not to share too much information or share information too widely. Systems that share information without requiring an explicit action by a user to initiate the sharing must be particularly cautious in this respect. Presence systems are an emerging class of applications that support collaboration. Through the use of pervasive sensors, these systems estimate user location, activities, and available communication channels. Because such presence data are sensitive, to achieve wide-spread adoption, sharing models must reflect the privacy and sharing preferences of their users. This paper looks at the role that privacy-preserving aggregation can play in addressing certain user sharing and privacy concerns with respect to presence data. We define conditions to achieve CollaPSE (Collaboration Presence Sharing Encryption) security, in which (i) an individual has full access to her own data, (ii) a third party performs computation on the data without learning anything about the data values, and (iii) people with special privileges called “analysts” can learn statistical information about groups of individuals, but nothing about the individual values contributing to the statistic other than what can be deduced from the statistic. More specifically, analysts can decrypt aggregates without being able to decrypt the individual values contributing to the aggregate. Based in part on studies we carried out that illustrate the need for the conditions encapsulated by CollaPSE security, we designed and implemented a family of CollaPSE protocols. We analyze their security, discuss efficiency tradeoffs, describe extensions, and review more recent privacy-preserving aggregation work.
- Publication Details
-
- CHI 2013
- Apr April 27, 2013
Abstract
Close- Publication Details
-
- IUI 2013
- Mar March 19, 2013
Abstract
Close- Publication Details
-
- IUI 2013
- Mar March 19, 2013
Abstract
Close- Publication Details
-
- IUI 2013
- Mar March 19, 2013
Abstract
Close- Publication Details
-
- SPIE Electronic Imaging 2013
- Feb February 3, 2013