skip to main content
10.1145/2181196acmconferencesBook PagePublication PageseurosysConference Proceedingsconference-collections
MPM '12: Proceedings of the First Workshop on Measurement, Privacy, and Mobility
ACM2012 Proceeding
  • Program Chairs:
  • Hamed Haddadi,
  • Eiko Yoneki
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
EuroSys '12: Seventh EuroSys Conference 2012 Bern Switzerland 10 April 2012
ISBN:
978-1-4503-1163-2
Published:
10 April 2012
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Next Conference
March 30 - April 3, 2025
Rotterdam , Netherlands
Reflects downloads up to 20 Feb 2025Bibliometrics
Skip Abstract Section
Abstract

The First Workshop on Measurement, Privacy, and Mobility (MPM'12) will gather researchers to discuss novel ideas about measurement, privacy, and mobility. The ever increasing need for our personal data, location, preferences and interests has raised the bar for regulations and techniques to catch up with the privacy and security aspects of such information. In this workshop we aim to discuss systems, methods, policies and techniques that help in profiling, data mining, offering location based services, while making an attempt in improving privacy preservation.

We aim to solicit research papers, work in progress papers and reports from a variety of disciplines, including but not limited to data mining, security, privacy, advertising, epidemics and information dissemination, mobility and location-based data services across academia and industry in order to create a dynamic inter-disciplinary workshop environment.

Skip Table Of Content Section
research-article
SecureSafe: a highly secure online data safe industrial use case
Article No.: 1, Pages 1–6https://doi.org/10.1145/2181196.2181197

In this paper, we present the core security architecture of SecureSafe, a cloud service that provides a highly secure online storage for sensitive data. The architecture combines best practices in cryptography and security protocols with novel ...

research-article
A model of information flow control to determine whether malfunctions cause the privacy invasion
Article No.: 2, Pages 1–6https://doi.org/10.1145/2181196.2181198

Privacy is difficult to assure in complex systems that collect, process, and store data about individuals. The problem is particularly acute when data arise from sensing physical phenomena as individuals are unlikely to realise that actions such as ...

research-article
Next place prediction using mobility Markov chains
Article No.: 3, Pages 1–6https://doi.org/10.1145/2181196.2181199

In this paper, we address the issue of predicting the next location of an individual based on the observations of his mobility behavior over some period of time and the recent locations that he has visited. This work has several potential applications ...

research-article
ANOSIP: anonymizing the SIP protocol
Article No.: 4, Pages 1–6https://doi.org/10.1145/2181196.2181200

Enhancing anonymity in the Session Initiation Protocol (SIP) is much more than sealing participants' identities. It requires methods to unlink the communication parties and relax their proximity identification. These requirements should be fulfilled ...

research-article
Confidential carbon commuting: exploring a privacy-sensitive architecture for incentivising 'greener' commuting
Article No.: 5, Pages 1–6https://doi.org/10.1145/2181196.2181201

We discuss the problem of building a user-acceptable infrastructure for a large organisation that wishes to measure its employees' travel-to-work carbon footprint, based on the gathering of high resolution geolocation data on employees in a privacy-...

research-article
The impact of trace and adversary models on location privacy provided by K-anonymity
Article No.: 6, Pages 1–6https://doi.org/10.1145/2181196.2181202

Privacy preserving mechanisms help users of location-based services to balance their location privacy while still getting useful results from the service. The provided location privacy depends on the users' behavior and an adversary's knowledge used to ...

research-article
An empirical study on IMDb and its communities based on the network of co-reviewers
Article No.: 7, Pages 1–6https://doi.org/10.1145/2181196.2181203

The advent of business oriented and social networking sites on the Internet have seen a huge increase in number of people using them in recent years. With the expansion of Web 2.0, new types of websites have emerged such as online social networks, blogs ...

research-article
Providing secure and accountable privacy to roaming 802.11 mobile devices
Article No.: 8, Pages 1–6https://doi.org/10.1145/2181196.2181204

Nowadays, roaming individuals require ubiquitous, effortless, secure and private "on-the-go" connectivity for their Mobile Device (MD). At the same time, WiFi Access Networks (ANs) need to offer connectivity to MDs in an accountable and credible manner ...

research-article
When browsing leaves footprints: automatically detect privacy violations
Article No.: 9, Pages 1–6https://doi.org/10.1145/2181196.2181205

Web sites use a number of different techniques to gather information about the behavior and interests of their visitors. In many cases this collection happens without the knowledge of the visitors and is continued across different domains in the world ...

Contributors
  • Brave Software, Inc.
  • University of Cambridge

Recommendations

Acceptance Rates

Overall Acceptance Rate 6 of 20 submissions, 30%
YearSubmittedAcceptedRate
MPM '1220630%
Overall20630%