<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" xmlns:burst="http://xmlns.com/burst/0.1/" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" xmlns="http://purl.org/rss/1.0/" xmlns:admin="http://webns.net/mvcb/" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns:swrc="http://swrc.ontoware.org/ontology#" xmlns:cc="http://web.resource.org/cc/"><channel rdf:about="https://puma.ub.uni-stuttgart.de/tag/stream_processing%20databases"><title>PUMA publications for /tag/stream_processing%20databases</title><link>https://puma.ub.uni-stuttgart.de/tag/stream_processing%20databases</link><description>PUMA RSS feed for /tag/stream_processing%20databases</description><dc:date>2026-04-22T13:24:16+02:00</dc:date><items><rdf:Seq><rdf:li rdf:resource="https://puma.ub.uni-stuttgart.de/bibtex/229482e95a9cbd13bb7a1762d7a0b2013/christophstach"/></rdf:Seq></items></channel><item rdf:about="https://puma.ub.uni-stuttgart.de/bibtex/229482e95a9cbd13bb7a1762d7a0b2013/christophstach"><title>How a Pattern-based Privacy System Contributes to Improve Context Recognition</title><link>https://puma.ub.uni-stuttgart.de/bibtex/229482e95a9cbd13bb7a1762d7a0b2013/christophstach</link><dc:creator>christophstach</dc:creator><dc:date>2020-09-21T11:45:55+02:00</dc:date><dc:subject>access_control complex_event_processing databases pattern_concealing privacy stream_processing </dc:subject><content:encoded>&lt;span data-person-type=&#034;author&#034; class=&#034;authorEditorList &#034;&gt;&lt;span&gt;&lt;span itemtype=&#034;http://schema.org/Person&#034; itemscope=&#034;itemscope&#034; itemprop=&#034;author&#034;&gt;&lt;a title=&#034;Christoph Stach&#034; itemprop=&#034;url&#034; href=&#034;/person/15a0424aefb2e6d7dc76587b78766c211/author/0&#034;&gt;&lt;span itemprop=&#034;name&#034;&gt;C. Stach&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;, &lt;/span&gt;&lt;span&gt;&lt;span itemtype=&#034;http://schema.org/Person&#034; itemscope=&#034;itemscope&#034; itemprop=&#034;author&#034;&gt;&lt;a title=&#034;Frank Dürr&#034; itemprop=&#034;url&#034; href=&#034;/person/15a0424aefb2e6d7dc76587b78766c211/author/1&#034;&gt;&lt;span itemprop=&#034;name&#034;&gt;F. Dürr&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;, &lt;/span&gt;&lt;span&gt;&lt;span itemtype=&#034;http://schema.org/Person&#034; itemscope=&#034;itemscope&#034; itemprop=&#034;author&#034;&gt;&lt;a title=&#034;Kai Mindermann&#034; itemprop=&#034;url&#034; href=&#034;/person/15a0424aefb2e6d7dc76587b78766c211/author/2&#034;&gt;&lt;span itemprop=&#034;name&#034;&gt;K. Mindermann&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;, &lt;/span&gt;&lt;span&gt;&lt;span itemtype=&#034;http://schema.org/Person&#034; itemscope=&#034;itemscope&#034; itemprop=&#034;author&#034;&gt;&lt;a title=&#034;Saravana Murthy Palanisamy&#034; itemprop=&#034;url&#034; href=&#034;/person/15a0424aefb2e6d7dc76587b78766c211/author/3&#034;&gt;&lt;span itemprop=&#034;name&#034;&gt;S. Palanisamy&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;, &lt;/span&gt; and &lt;span&gt;&lt;span itemtype=&#034;http://schema.org/Person&#034; itemscope=&#034;itemscope&#034; itemprop=&#034;author&#034;&gt;&lt;a title=&#034;Stefan Wagner&#034; itemprop=&#034;url&#034; href=&#034;/person/15a0424aefb2e6d7dc76587b78766c211/author/4&#034;&gt;&lt;span itemprop=&#034;name&#034;&gt;S. Wagner&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;. &lt;/span&gt;&lt;span class=&#034;additional-entrytype-information&#034;&gt;&lt;span itemtype=&#034;http://schema.org/Book&#034; itemscope=&#034;itemscope&#034; itemprop=&#034;isPartOf&#034;&gt;&lt;em&gt;&lt;span itemprop=&#034;name&#034;&gt;Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops&lt;/span&gt;, &lt;/em&gt;&lt;/span&gt;&lt;em&gt;page &lt;span itemprop=&#034;pagination&#034;&gt;238–243&lt;/span&gt;. &lt;/em&gt;&lt;em&gt;Athens, &lt;/em&gt;&lt;em&gt;&lt;span itemprop=&#034;publisher&#034;&gt;IEEE&lt;/span&gt;, &lt;/em&gt;(&lt;em&gt;&lt;span&gt;March 2018&lt;meta content=&#034;March 2018&#034; itemprop=&#034;datePublished&#034;/&gt;&lt;/span&gt;&lt;/em&gt;)&lt;/span&gt;</content:encoded><taxo:topics><rdf:Bag><rdf:li rdf:resource="https://puma.ub.uni-stuttgart.de/tag/access_control"/><rdf:li rdf:resource="https://puma.ub.uni-stuttgart.de/tag/complex_event_processing"/><rdf:li rdf:resource="https://puma.ub.uni-stuttgart.de/tag/databases"/><rdf:li rdf:resource="https://puma.ub.uni-stuttgart.de/tag/pattern_concealing"/><rdf:li rdf:resource="https://puma.ub.uni-stuttgart.de/tag/privacy"/><rdf:li rdf:resource="https://puma.ub.uni-stuttgart.de/tag/stream_processing"/></rdf:Bag></taxo:topics><burst:publication><rdf:Description rdf:about="https://puma.ub.uni-stuttgart.de/bibtex/229482e95a9cbd13bb7a1762d7a0b2013/christophstach"><owl:sameAs rdf:resource="/uri/bibtex/229482e95a9cbd13bb7a1762d7a0b2013/christophstach"/><rdf:type rdf:resource="http://swrc.ontoware.org/ontology#InProceedings"/><swrc:date>Mon Sep 21 11:45:55 CEST 2020</swrc:date><swrc:address>Athens</swrc:address><swrc:booktitle>Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops</swrc:booktitle><swrc:month>mar</swrc:month><swrc:pages>238–243</swrc:pages><swrc:publisher><swrc:Organization swrc:name="IEEE"/></swrc:publisher><swrc:series>CoMoRea &#039;18</swrc:series><swrc:title>How a Pattern-based Privacy System Contributes to Improve Context Recognition</swrc:title><swrc:year>2018</swrc:year><swrc:keywords>access_control complex_event_processing databases pattern_concealing privacy stream_processing </swrc:keywords><swrc:abstract>As Smart Devices have access to a lot of user-preferential data, they come in handy in any situation. Although such data—as well as the knowledge which can be derived from it—is highly beneficial as apps are able to adapt their services appropriate to the respective context, it also poses a privacy threat. Thus, a lot of research work is done regarding privacy. Yet, all approaches obfuscate certain attributes which has a negative impact on context recognition and thus service quality. Therefore, we introduce a novel access control mechanism called PATRON. The basic idea is to control access to information patterns. For instance, a person suffering from diabetes might not want to reveal his or her unhealthy eating habit, which can be derived from the pattern &#034;rising blood sugar level&#034; → &#034;adding bread units&#034;. Such a pattern which must not be discoverable by some parties (e.g., insurance companies) is called private pattern whereas a pattern which improves an app&#039;s service quality is labeled as public pattern. PATRON employs different techniques to conceal private patterns and, in case of available alternatives, selects the one with the least negative impact on service quality, such that the recognition of public patterns is supported as good as possible.</swrc:abstract><swrc:hasExtraField><swrc:Field swrc:value="978-1-5386-3228-4" swrc:key="isbn"/></swrc:hasExtraField><swrc:hasExtraField><swrc:Field swrc:value="10.1109/PERCOMW.2018.8480227" swrc:key="doi"/></swrc:hasExtraField><swrc:author><rdf:Seq><rdf:_1><swrc:Person swrc:name="Christoph Stach"/></rdf:_1><rdf:_2><swrc:Person swrc:name="Frank Dürr"/></rdf:_2><rdf:_3><swrc:Person swrc:name="Kai Mindermann"/></rdf:_3><rdf:_4><swrc:Person swrc:name="Saravana Murthy Palanisamy"/></rdf:_4><rdf:_5><swrc:Person swrc:name="Stefan Wagner"/></rdf:_5></rdf:Seq></swrc:author><swrc:editor><rdf:Seq><rdf:_1><swrc:Person swrc:name="George Roussos"/></rdf:_1><rdf:_2><swrc:Person swrc:name="Achilles Kameas"/></rdf:_2><rdf:_3><swrc:Person swrc:name="Pascal Hirmer"/></rdf:_3><rdf:_4><swrc:Person swrc:name="Timo Sztyler"/></rdf:_4><rdf:_5><swrc:Person swrc:name="Jadwiga Indulska"/></rdf:_5></rdf:Seq></swrc:editor></rdf:Description></burst:publication></item></rdf:RDF>