Privacy in Sensor Webs and Distributed Information Systems

  • J.D. Tygar
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2609)


We are seeing rapid development of sensor webs that collect information and distributed information aggregation systems — and these trends are present both in industry and government. This paper outlines a research agenda for address privacy questions raised by sensors webs and distributed information systems.


Private Information Privacy Policy Terrorist Attack Privacy Restriction Information Awareness 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    D. Dyer. Genisys. In [8]Google Scholar
  2. 2.
    S. Haber and W. Stornetta. “How to Timestamp a Digital Document.” Journal of Cryptology, Vol. 3, No. 2, pp. 99–111, 1991CrossRefGoogle Scholar
  3. 3.
    G. Mack, B. Bebee, I. Shafti, G. Wenzel, B. Mediary, E. Yuan. Total Information Awareness Program (TIA) System Description Document (SDD), Version 1.1. July 19, 2002. In [8].Google Scholar
  4. 4.
    A. Perrig and J. D. Tygar, Secure Broadcast Communication: in Wired and Wireless Communications, Kluwer, 2002.Google Scholar
  5. 5.
    J. Poindexter. DARPA’s Initiative on Countering Terrorism: Total Information Awareness. In [8].Google Scholar
  6. 6.
    President’s National Critical Infrastructure Boad. Draft National Strategy to Secure Cyberspace: Draft for Comment. September 18, 2002.
  7. 7.
    D. Song, D. Wagner, and A. Perrig. “Practical Techniques for Search on Encrypted Data.” In Proceedings 2000 IEEE Symposium on Security and Privacy.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • J.D. Tygar
    • 1
  1. 1.EECS and SIMSUniversity of CaliforniaBerkeleyUSA

Personalised recommendations