How does misconfiguration of analytic services compromise mobile privacy?
Xueling ZhangXiaoyin WangRocky SlavinTravis D. BreauxJianwei NiuPublished in: ICSE (2020)
Keyphrases
- location aware
- mobile services
- mobile commerce
- mobile environments
- mobile networks
- context aware
- mobile devices
- mobile applications
- mobile peer to peer
- identity management
- computing environments
- health monitoring systems
- service management
- privacy preserving
- web services
- value added services
- service providers
- security risks
- internet services
- user centric
- user privacy
- personal information
- end users
- service oriented
- personal data
- pervasive computing
- communication technologies
- ubiquitous computing
- middleware architecture
- mobile phone
- mobile payment
- smart phones
- mobile users
- wireless internet
- context aware services
- service discovery
- privacy preserving data mining
- location information
- information loss
- privacy preservation
- mobile computing
- electronic payment
- information services
- wireless technologies
- electronic commerce
- service composition
- mobile terminals
- m learning
- context aware systems
- sensitive information
- data privacy