{"id":"https://openalex.org/W2147376368","doi":"https://doi.org/10.1109/cisim.2010.5643649","title":"Context protecting privacy preservation in ubiquitous computing","display_name":"Context protecting privacy preservation in ubiquitous computing","publication_year":2010,"publication_date":"2010-10-01","ids":{"openalex":"https://openalex.org/W2147376368","doi":"https://doi.org/10.1109/cisim.2010.5643649","mag":"2147376368"},"language":"en","primary_location":{"id":"doi:10.1109/cisim.2010.5643649","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisim.2010.5643649","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1108.2111","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068538481","display_name":"Arijit Ukil","orcid":"https://orcid.org/0000-0003-1794-6719"},"institutions":[{"id":"https://openalex.org/I55215948","display_name":"Tata Consultancy Services (India)","ror":"https://ror.org/01b9n8m42","country_code":"IN","type":"company","lineage":["https://openalex.org/I4210086519","https://openalex.org/I55215948"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Arijit Ukil","raw_affiliation_strings":["Innovation Laboratories, Tata Consultancy Services Limited, Kolkata, India","[Innovation Lab, Tata Consultancy Services Kolkata, India]"],"affiliations":[{"raw_affiliation_string":"Innovation Laboratories, Tata Consultancy Services Limited, Kolkata, India","institution_ids":["https://openalex.org/I55215948"]},{"raw_affiliation_string":"[Innovation Lab, Tata Consultancy Services Kolkata, India]","institution_ids":["https://openalex.org/I55215948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5068538481"],"corresponding_institution_ids":["https://openalex.org/I55215948"],"apc_list":null,"apc_paid":null,"fwci":1.1302,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.81067386,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"3178","issue":null,"first_page":"273","last_page":"278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.8418056964874268},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8148720860481262},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6940332055091858},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6798713207244873},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6423577666282654},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5256960391998291},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5137782692909241},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5121140480041504},{"id":"https://openalex.org/keywords/context-awareness","display_name":"Context awareness","score":0.5015511512756348},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4932488799095154},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.454184889793396},{"id":"https://openalex.org/keywords/context-model","display_name":"Context model","score":0.42738693952560425},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3510042726993561},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.2151786983013153},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0938924252986908}],"concepts":[{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.8418056964874268},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8148720860481262},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6940332055091858},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6798713207244873},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6423577666282654},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5256960391998291},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5137782692909241},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5121140480041504},{"id":"https://openalex.org/C2781368080","wikidata":"https://www.wikidata.org/wiki/Q501688","display_name":"Context awareness","level":3,"score":0.5015511512756348},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4932488799095154},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.454184889793396},{"id":"https://openalex.org/C183322885","wikidata":"https://www.wikidata.org/wiki/Q17007702","display_name":"Context model","level":3,"score":0.42738693952560425},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3510042726993561},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2151786983013153},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0938924252986908},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cisim.2010.5643649","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisim.2010.5643649","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1108.2111","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1108.2111","pdf_url":"https://arxiv.org/pdf/1108.2111","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1108.2111","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1108.2111","pdf_url":"https://arxiv.org/pdf/1108.2111","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5299999713897705}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W119333873","https://openalex.org/W1534285372","https://openalex.org/W1537972479","https://openalex.org/W1539259921","https://openalex.org/W2017273960","https://openalex.org/W2026155725","https://openalex.org/W2077884493","https://openalex.org/W2084445382","https://openalex.org/W2088069667","https://openalex.org/W2092422002","https://openalex.org/W2100707674","https://openalex.org/W2104208424","https://openalex.org/W2111071589","https://openalex.org/W2116269350","https://openalex.org/W2128026023","https://openalex.org/W2131924466","https://openalex.org/W2134149606","https://openalex.org/W2138505526","https://openalex.org/W2144991237","https://openalex.org/W2167627865","https://openalex.org/W2336628934","https://openalex.org/W3141585064","https://openalex.org/W4238346020","https://openalex.org/W6604889898","https://openalex.org/W6632236638","https://openalex.org/W6655093401"],"related_works":["https://openalex.org/W1553902753","https://openalex.org/W2057969524","https://openalex.org/W57335507","https://openalex.org/W4292139036","https://openalex.org/W1656433004","https://openalex.org/W2127178188","https://openalex.org/W2436001314","https://openalex.org/W2116169104","https://openalex.org/W4233069924","https://openalex.org/W2542603226"],"abstract_inverted_index":{"In":[0,94],"ubiquitous":[1,12,86,134],"computing":[2,87,135],"domain":[3],"context":[4,88,111,115],"awareness":[5],"is":[6,19,77,90],"an":[7],"important":[8],"issue.":[9],"So,":[10,75],"in":[11,85],"computing,":[13],"mere":[14],"protection":[15,89,106],"of":[16,24,66,71,91,107,133,137,152,160,167],"message":[17],"confidentiality":[18],"not":[20],"sufficient":[21],"for":[22,80],"most":[23,70],"the":[25,43,53,56,72,130,150,158,165],"applications":[26],"where":[27],"context-awareness":[28],"can":[29,68],"lead":[30],"to":[31,163],"near":[32],"deterministic":[33],"ideas.":[34],"An":[35],"adversary":[36],"might":[37],"deduce":[38],"sensitive":[39,73],"information":[40,51],"by":[41,63],"observing":[42],"contextual":[44,126],"data,":[45],"which":[46,101],"when":[47],"correlated":[48],"with":[49],"prior":[50],"about":[52],"people":[54],"and":[55,82,124],"physical":[57],"locations":[58],"that":[59,79],"are":[60],"being":[61],"monitored":[62],"a":[64,99],"set":[65],"sensors":[67],"reveal":[69],"information.":[74,127],"it":[76],"obvious":[78],"security":[81],"privacy":[83,105,117],"preservation":[84,118],"equal":[92],"importance.":[93],"this":[95],"paper,":[96],"we":[97,148],"propose":[98],"scheme":[100,119,162],"provides":[102],"two":[103],"layer":[104],"user's":[108],"or":[109],"application's":[110],"data.":[112],"Our":[113],"proposed":[114],"protecting":[116,122],"focuses":[120],"on":[121],"spatial":[123],"temporal":[125],"We":[128,155],"consider":[129],"communication":[131],"part":[132],"consists":[136],"tiny":[138],"sensor":[139],"nodes":[140],"forming":[141],"Wireless":[142],"Sensor":[143],"Networks":[144],"(WSNs).":[145],"Through":[146],"simulation":[147],"show":[149],"efficacy":[151],"our":[153,161],"scheme.":[154],"also":[156],"demonstrate":[157],"capability":[159],"overcome":[164],"constraints":[166],"WSNs.":[168]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
