@misc{17_garza2025prvl,
  title = {PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction},
  author = {Leon Garza and Anantaa Kotal and Aritran Piplai and Lavanya Elluri  and \textbf{Prajit Kumar Das} and Aman Chadha},
  year = {2025},
  eprint = {2508.05545},
  archiveprefix = {arXiv},
  primaryclass = {cs.CR},
  url = {https://arxiv.org/abs/2508.05545},
  abstract = {Redacting Personally Identifiable Information (PII) from unstructured text is critical for ensuring data privacy in regulated domains. While earlier approaches have relied on rule-based systems and domain-specific NER models, these methods fail to generalize across formats and contexts. Recent advances in Large Language Models (LLMs) offer a promising alternative, yet the effect of architectural and training choices on redaction performance remains underexplored. LLMs have demonstrated strong performance in tasks that require contextual language understanding, including the redaction of PII in freeform text. Prior work suggests that with appropriate adaptation, LLMs can become effective contextual privacy learners. However, the consequences of architectural and training choices for PII Redaction remain underexplored. In this work, we present a comprehensive analysis of LLMs as privacy-preserving PII Redaction systems. We evaluate a range of Large Language Model (LLM) architectures and training strategies for their effectiveness in PII Redaction. Our analysis measures redaction performance, semantic preservation, and PII leakage, and compares these outcomes against latency and computational cost. The results provide practical guidance for configuring LLMbased redactors that are accurate, efficient, and privacy-aware. To support reproducibility and real-world deployment, we release PRvL, an open-source suite of fine-tuned models, and evaluation tools for general-purpose PII Redaction. PRvL is built entirely on open-source LLMs and supports multiple inference settings for flexibility and compliance. It is designed to be easily customized for different domains and fully operable within secure, selfmanaged environments. This enables data owners to perform redactions without relying on third-party services or exposing sensitive content beyond their own infrastructure.}
}
@inproceedings{16_dutta2020context,
  author = {Dutta, Sofia and Chukkapalli, Sai Sree Laya and Sulgekar, Madhura and Krithivasan, Swathi and \textbf{Prajit Kumar Das} and Joshi, Anupam},
  booktitle = {2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)},
  title = {Context Sensitive Access Control in Smart Home Environments},
  year = {2020},
  volume = {},
  number = {},
  pages = {35-41},
  keywords = {Access control;Privacy;Cloud computing;Conferences;Smart homes;Big Data;Data models},
  doi = {10.1109/BigDataSecurity-HPSC-IDS49724.2020.00018},
  abstract = {The rise in popularity of Internet of Things (IoT) devices has opened doors for privacy and security breaches in Cyber-Physical systems like smart homes, smart vehicles, and smart grids that affect our daily existence. IoT systems are also a source of big data that gets shared via cloud. IoT systems in a smart home environment have sensitive access control issues since they are deployed in a personal space. The collected data can also be of highly personal nature. Therefore, it is critical to build access control models that govern who, under what circumstances, can access which sensed data or actuate a physical system. Traditional access control mechanisms are not expressive enough to handle such complex access control needs, warranting the incorporation of new methodologies for privacy and security. In this paper, we propose the creation of the PALS system, that builds upon existing work in attribute based access control model, captures physical context collected from sensed data (attributes), and performs dynamic reasoning over these attributes and context driven policies using Semantic Web technologies to execute access control decisions. Reasoning over user context, details of information collected by cloud service provider and device type our mechanism generates as a consequent access control decisions. Our system’s access control decisions are supplemented by another sub-system that detects intrusions into smart home systems based on both network and behavioral data. The combined approach serves to determine indicators that a smart home system is under attack, as well as limit what data breach such attacks can achieve.}
}
@inproceedings{15_das2017personalizing,
  author = {\textbf{Prajit Kumar Das} and Joshi, Anupam and Finin, Tim},
  booktitle = {2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)},
  title = {Personalizing Context-Aware Access Control on Mobile Platforms},
  year = {2017},
  volume = {},
  number = {},
  pages = {107-116},
  keywords = {Access control;Mobile communication;Mobile handsets;Context modeling;Middleware;OWL;mobile access control;personalized access control;user security and privacy},
  doi = {10.1109/CIC.2017.00025},
  abstract = {Context-sensitive access control has been a research topic within mobile computing for more than a decade. Much of the work has focused on modeling context and representing policies. Choosing an appropriate policy for a user, however, remains a challenging goal. Creating usable mobile access control solutions have been researched from a users' permission control perspective. We present a study carried out with subjects using their personal mobile devices that captures individualized policies through an iterative user feedback process. Policy precision, also referred to as "Violation Metric" (VM), was used to decide when all necessary policies had been captured. The feedback process used a hierarchical context ontology to represent user-context and gathered contextual-situations in which a policy would be applicable. The study also investigated the feasibility of using the VM measure to determine completion of the capture process for the users' personalized access control policies, that handles their mobile privacy and security needs. Using an appropriate pre-defined policy is shown to have lesser user impact when trying to personalize access control policies for users.}
}
@phddissertation{14_das2017context,
  title = {{Context-Dependent Privacy and Security Management on Mobile Devices}},
  author = {\textbf{Prajit Kumar Das}},
  school = {University of Maryland, Baltimore County},
  year = {2017},
  abstract = {There are ongoing security and privacy concerns regarding mobile platforms that are being used by a growing number of citizens. Security and privacy models typically used by mobile platforms use one-time permission acquisition mechanisms. However, modifying access rights after initial authorization in mobile systems is often too tedious and complicated for users. User studies show that a typical user does not understand permissions requested by applications or are too eager to use the applications to care to understand the permission implications. For example, the Brightest Flashlight application was reported to have logged precise locations and unique user identifiers, which have nothing to do with a flashlight application's intended functionality, but more than 50 million users used a version of this application which would have forced them to allow this permission. Given the penetration of mobile devices into our lives, a fine-grained context-dependent security and privacy control approach needs to be created. We have created Mithril as an end-to-end mobile access control framework that allows us to capture access control needs for specific users, by observing violations of known policies. The framework studies mobile application executables to better inform users of the risks associated with using certain applications. The policy capture process involves an iterative user feedback process that captures policy modifications required to mediate observed violations. Precision of policy is used to determine convergence of the policy capture process. Policy rules in the system are written using Semantic Web technologies and the Platys ontology to define a hierarchical notion of context. Policy rule antecedents are comprised of context elements derived using the Platys ontology employing a query engine, an inference mechanism and mobile sensors. We performed a user study that proves the feasibility of using our violation driven policy capture process to gather user-specific policy modifications.We contribute to the static and dynamic study of mobile applications by defining "application behavior" as a possible way of understanding mobile applications and creating access control policies for them. Our user study also shows that unlike our behavior-based policy, a "deny by default" mechanism hampers usability of access control systems. We also show that inclusion of crowd-sourced policies leads to further reduction in user burden and need for engagement while capturing context-based access control policy. We enrich knowledge about mobile "application behavior" and expose this knowledge through the Mobipedia knowledge-base. We also extend context synthesis for semantic presence detection on mobile devices by combining Bluetooth, low energy beacons and Nearby Messaging services from Google.},
  url = {https://search.proquest.com/openview/16c971289980e4fe32064bc588dfcb45/1?pq-origsite=gscholar&cbl=18750&diss=y}
}
@inproceedings{13_das2017appbehavior,
  author = {\textbf{Prajit Kumar Das} and Joshi, Anupam and Finin, Tim},
  booktitle = {2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)},
  title = {App behavioral analysis using system calls},
  year = {2017},
  volume = {},
  number = {},
  pages = {487-492},
  keywords = {Google;Mobile handsets;Androids;Humanoid robots;Mobile communication;Conferences;Mobile applications},
  doi = {10.1109/INFCOMW.2017.8116425},
  abstract = {System calls provide an interface to the services made available by an operating system. As a result, any functionality provided by a software application eventually reduces to a set of fixed system calls. Since system calls have been used in literature, to analyze program behavior we made an assumption that analyzing the patterns in calls made by a mobile application would provide us insight into its behavior. In this paper, we present our preliminary study conducted with 534 mobile applications and the system calls made by them. Due to a rising trend of mobile applications providing multiple functionalities, our study concluded, mapping system calls to functional behavior of a mobile application was not straightforward. We use Weka tool and manually annotated application behavior classes and system call features in our experiments to show that using such features achieves mediocre F1-measure at best, for app behavior classification. Thus leading to the conclusion that system calls were not sufficient features for app behavior classification.}
}
@inproceedings{12_das2016policycapture,
  author = {\textbf{Prajit Kumar Das} and Joshi, Anupam and Finin, Tim},
  booktitle = {2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)},
  title = {Capturing Policies for Fine-Grained Access Control on Mobile Devices},
  year = {2016},
  volume = {},
  number = {},
  pages = {54-63},
  keywords = {Context;Access control;Mobile handsets;Measurement;Context modeling;Privacy;Androids},
  doi = {10.1109/CIC.2016.021},
  abstract = {As of 2016, there are more mobile devices than humans on earth. Today, mobile devices are a critical part of our lives and often hold sensitive corporate and personal data. As a result, they are a lucrative target for attackers, and managing data privacy and security on mobile devices has become a vital issue. Existing access control mechanisms in most devices are restrictive and inadequate. They do not take into account the context of a device and its user when making decisions. In many cases, the access granted to a subject should change based on context of a device. Such fine-grained, context-sensitive access control policies have to be personalized too. In this paper, we present the Mithril system, that uses policies represented in Semantic Web technologies and captured using user feedback, to handle access control on mobile devices. We present an iterative feedback process to capture user specific policy. We also present a policy violation metric that allows us to decide when the capture process is complete.}
}
@inbook{11_das2016bookchapter,
  title = {Preserving user privacy and security in context-aware mobile platforms},
  author = {\textbf{Prajit Kumar Das} and Ghosh, Dibyajyoti and Jagtap, Pramod and Joshi, Anupam and Finin, Tim},
  booktitle = {Mobile Application Development, Usability, and Security},
  pages = {166--193},
  year = {2017},
  publisher = {IGI Global Scientific Publishing},
  abstract = {Contemporary smartphones are capable of generating and transmitting large amounts of data about their users. Recent advances in collaborative context modeling combined with a lack of adequate permission model for handling dynamic context sharing on mobile platforms have led to the emergence of a new class of mobile applications that can access and share embedded sensor and context data. Most of the time such data is used for providing tailored services to the user but it can lead to serious breaches of privacy. We use Semantic Web technologies to create a rich notion of context. We also discuss challenges for context aware mobile platforms and present approaches to manage data flow on these devices using semantically rich fine-grained context-based policies that allow users to define their privacy and security need using tools we provide.},
  doi = {10.4018/978-1-5225-0945-5.ch008},
  url = {http://www.igi-global.com/chapter/preserving-user-privacy-and-security-in-context-aware-mobile-platforms/169681}
}
@inproceedings{10_das2016physical,
  title = {{Semantic Knowledge and Privacy in the Physical Web}},
  author = {\textbf{Prajit Kumar Das} and Kashyap, Abhay and Singh, Gurpreet and Matuszek, Cynthia and Finin, Tim and Joshi, Anupam},
  booktitle = {Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2016) co-located with the 15th International Semantic Web Conference (ISWC 2016), Kobe, Japan, October 17, 2016.},
  year = {2016},
  volume = {ISWC 2016},
  abstract = {In the past few years, the Internet of Things has started to become a reality; however, its growth has been hampered by privacy and security concerns. One promising approach is to use Semantic Web technologies to mitigate privacy concerns in an informed, flexible way. We present CARLTON, a framework for managing data privacy for entities in a Physical Web deployment using Semantic Web technologies. CARLTON uses context-sensitive privacy policies to protect privacy of organizational and personnel data. We provide use case scenarios where natural language queries for data are handled by the system, and show how privacy policies may be used to manage data privacy in such scenarios, based on an ontology of concepts that can be used as rule antecedents in customizable privacy policies.},
  keywords = {context sensitive policies,internet of things,physical web,privacy},
  url = {http://ceur-ws.org/Vol-1750/paper-01.pdf}
}
@inproceedings{09_mittal2016cyber,
  author = {Mittal, Sudip and \textbf{Prajit Kumar Das} and Mulwad, Varish and Joshi, Anupam and Finin, Tim},
  booktitle = {2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)},
  title = {CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities},
  year = {2016},
  volume = {},
  number = {},
  pages = {860-867},
  keywords = {Computer security;Twitter;Knowledge based systems;Software;Data mining;Ontologies},
  doi = {10.1109/ASONAM.2016.7752338},
  abstract = {In order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert sources like the National Vulnerability Database, CERT alerts, blog posts, social media, and dark web resources. Intelligence updates about cybersecurity can be viewed as temporal events that a security analyst must keep up with so as to secure a computer system. We describe CyberTwitter, a system to discover and analyze cybersecurity intelligence on Twitter and serve as a OSINT (Open–source intelligence) source. We analyze real time information updates, in form of tweets, to extract intelligence about various possible threats. We use the Semantic Web RDF to represent the intelligence gathered and SWRL rules to reason over extracted intelligence to issue alerts for security analysts.},
  url = {http://ebiquity.umbc.edu/paper/html/id/752/CyberTwitter-Using-Twitter-to-generate-alerts-for-Cybersecurity-Threats-and-Vulnerabilities}
}
@inproceedings{08_das2016vehicle,
  author = {\textbf{Prajit Kumar Das} and Narayanan, Sandeep and Sharma, Nitin Kumar and Joshi, Anupam and Joshi, Karuna and Finin, Tim},
  booktitle = {2016 IEEE International Conference on Smart Computing (SMARTCOMP)},
  title = {Context-Sensitive Policy Based Security in Internet of Things},
  year = {2016},
  volume = {},
  number = {},
  pages = {1-6},
  keywords = {Internet of things;Access control;OWL;Cyber-physical systems;Context;Sensors},
  doi = {10.1109/SMARTCOMP.2016.7501684},
  abstract = {According to recent media reports, there has been a surge in the number of devices that are being connected to the Internet. The Internet of Things (IoT), also referred to as Cyber-Physical Systems, is a collection of physical entities with computational and communication capabilities. The storage and computing power of these devices is often limited and their designs currently focus on ensuring functionality and largely ignore other requirements, including security and privacy concerns. We present the design of a framework that allows IoT devices to capture, represent, reason with, and enforce information sharing policies. We use Semantic Web technologies to represent the policies, the information to be shared or protected, and the IoT device context. We discuss use-cases where our design will help in creating an "intelligent" IoT device and ensuring data security and privacy using context-sensitive information sharing policies.}
}
@inproceedings{07_pappachan2015mobipedia,
  title = {{Mobipedia: Mobile Applications Linked Data}},
  author = {Pappachan, Primal and Yus, Roberto and \textbf{Prajit Kumar Das} and Mehrotra, Sharad and Finin, Tim and Joshi, Anupam},
  booktitle = {Proceedings of the ISWC 2015 Posters {\&} Demonstrations Track co-located with the 14th International Semantic Web Conference (ISWC-2015), Bethlehem, PA, USA, October 11, 2015.},
  year = {2015},
  organization = {CEUR Workshop Proceedings (CEUR-WS.org)},
  pages = {2--5},
  volume = {1486},
  abstract = {We present Mobipedia, an integrated knowledge base with information about 1 million mobile applications (apps) such as their category, meta-data (author, reviews, rating, release date), permissions and libraries used, and similar apps. The goal of Mobipedia is to integrate unstructured and semi-structured data about mobile apps from publicly available data sources and publish it as Linked Data using RDF. We describe the extraction process for facts, access mechanisms to the knowledge base, and an overview of applications facilitated by Mobipedia.},
  issn = {1613-0073},
  keywords = {android,knowledge base,linked data,mobile applications,privacy,semantic web,sparql},
  url = {http://ceur-ws.org/Vol-1486/paper_92.pdf}
}
@inproceedings{06_pappachan2015building,
  title = {{Building a Mobile Applications Knowledge Base for the Linked Data Cloud}},
  author = {Pappachan, Primal and Yus, Roberto and \textbf{Prajit Kumar Das} and Mehrotra, Sharad and Finin, Tim and Joshi, Anupam},
  booktitle = {Proceedings of the 1st International Workshop on Mobile Deployment of Semantic Technologies (MoDeST 2015) co-located with 14th International Semantic Web Conference (ISWC 2015), Bethlehem, Pennsylvania, USA, October 11th, 2015.},
  year = {2015},
  organization = {CEUR Workshop Proceedings (CEUR-WS.org)},
  pages = {14--25},
  volume = {1486},
  abstract = {The number of mobile applications (apps) in major app stores exceeded one million in 2013. While app stores provide a central point for storing app metadata, they often impose restrictions on the access to this information thus limiting the potential to develop tools to search, recommend, and analyze app information. A few projects have circumvented these limitations and managed to create a dataset with a substantial number of apps. However, accessing this information, especially for the purpose of an integrated view, is difficult as there is no common standard for publishing data. We present Mobipedia, an effort to gather this information from various sources and publish it as RDF Linked Data. We describe the status of Mobipedia, which currently has information on more than one million apps that has been extracted from a number of unstructured and semi-structured sources. This paper describes the ontology used to model information, the process for fact extraction, and an overview of applications facilitated by Mobipedia.},
  issn = {1613-0073},
  keywords = {android,knowledge base,linked data,semantic web,sparql},
  url = {http://ceur-ws.org/Vol-1506/paper2.pdf}
}
@inproceedings{05_pappachan2014semantic,
  title = {{A semantic context-aware privacy model for FaceBlock}},
  author = {Pappachan, Primal and Yus, Roberto and \textbf{Prajit Kumar Das} and Finin, Tim and Mena, Eduardo and Joshi, Anupam},
  booktitle = {Proceedings of the 2nd Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014) co-located with the 13th International Semantic Web Conference (ISWC 2014), Trento, Italy, October 20, 2014.},
  year = {2014},
  organization = {CEUR Workshop Proceedings (CEUR-WS.org)},
  pages = {64--72},
  volume = {1316},
  abstract = {Wearable computing devices like Google Glass are at the forefront of technological evolution in smart devices. The ubiquitous and oblivious nature of photography using these devices has made people concerned about their privacy in private and public settings. The Face-Block (http://face-block.me/) project protects the privacy of people around Glass users by making pictures taken by the latter, Privacy-Aware. Through sharing of privacy policies, users can choose whether or not to be included in pictures. However, the current privacy model of FaceBlock only permits simple constraints such as allow versus disallow pictures. In this paper, we present an extended context-aware privacy model represented using OWL ontologies and SWRL rules. We also describe use cases of how this model can help FaceBlock to generate Privacy-Aware Pictures depending on context and privacy needs of the user.},
  issn = {1613-0073},
  keywords = {Context-aware,Google glass,Privacy,Semantic web},
  url = {http://ceur-ws.org/Vol-1316/privon2014_paper6.pdf}
}
@inproceedings{04_yus2014semantics,
  title = {{Semantics for Privacy and Shared Context}},
  author = {Yus, Roberto and Pappachan, Primal and \textbf{Prajit Kumar Das} and Finin, Tim and Joshi, Anupam and Mena, Eduardo},
  booktitle = {Proceedings of the 2nd Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014) co-located with the 13th International Semantic Web Conference (ISWC 2014), Trento, Italy, October 20, 2014.},
  year = {2014},
  organization = {CEUR Workshop Proceedings (CEUR-WS.org)},
  volume = {1316},
  abstract = {Capturing, maintaining, and using context information helps mobile applications provide better services and generates data useful in specifying information sharing policies. Obtaining the full benefit of context information requires a rich and expressive representation that is grounded in shared semantic models. We summarize some of our past work on representing and using context models and briefly describe Triveni, a system for cross-device context discovery and enrichment. Triveni represents context in RDF and OWL and reasons over context models to infer additional information and detect and resolve ambiguities and inconsistencies. A unique feature, its ability to create and manage "contextual groups" of users in an environment, enables their members to share context information using wireless ad-hoc networks. Thus, it enriches the information about a user's context by creating mobile ad hoc knowledge networks.},
  issn = {1613-0073},
  url = {http://ceur-ws.org/Vol-1316/privon2014_paper1.pdf}
}
@inproceedings{03_yus2014faceblock,
  title = {{Demo: FaceBlock: Privacy-Aware Pictures for Google Glass}},
  author = {Yus, Roberto and Pappachan, Primal and \textbf{Prajit Kumar Das} and Mena, Eduardo and Joshi, Anupam and Finin, Tim},
  booktitle = {The 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys'14, Bretton Woods, NH, USA, June 16-19, 2014},
  year = {2014},
  pages = {366},
  abstract = {FaceBlock takes regular pictures taken by your smartphone or Google Glass as input and converts them into Privacy-Aware Pictures. These pictures are generated by using a combination of Face Detection and Face Recognition algorithms. By using FaceBlock, a user can take a picture of herself and specify her policy/rule regarding pictures taken by others (in this case obscure my face in pictures from strangers). FaceBlock would automatically generate a mathematical representation of face identifier for this picture. Using Bluetooth, FaceBlock can automatically detect and share this policy with Glass users near by. FaceBlock is a proof of concept implementation of a system that can create Privacy-Aware Pictures using smart devices. The pervasiveness of Privacy-Aware Pictures could be a right step towards balancing privacy needs and comfort afforded by technology. Thus, we can get the best out of Wearable technology without being oblivious about the privacy of those around you.},
  doi = {10.1145/2594368.2601473}
}
@inproceedings{02_das2013energy,
  title = {{Energy Efficient Sensing for Managing Context and Privacy on Smartphones}},
  author = {\textbf{Prajit Kumar Das} and Joshi, Anupam and Finin, Tim},
  booktitle = {Proceedings of the 1st Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia, October 22, 2013.},
  year = {2013},
  organization = {CEUR Workshop Proceedings (CEUR-WS.org)},
  volume = {1121},
  abstract = {Mobile devices can better manage user privacy if they continuously model a user's context, but doing so can result in high energy consumption. We describe an approach which will reduce energy costs by reasoning about what context information is known, what additional information is needed, how accurate it must be and how to efficiently acquire it. We model the sensors and their data properties, accuracy levels and energy costs in a knowledge base supported by an ontology. We describe a method to manage privacy on smartphones in an energy efficient manner by selecting the best choice sensor for maintaining the user's context information. Sensor selection is done by COntext MANager miDDleware (COMANDD), which maintains a context model and answers queries about it. Context requests are served by capability matching, accuracy level matching and selection of lowest energy cost sensor for reporting context data. A context change detection function is used to decide when the context should be updated.},
  doi = {10.1145/2542095.2542114},
  issn = {1613-0073},
  url = {http://ceur-ws.org/Vol-1121/privon2013_paper1.pdf}
}
@article{01_das2013hotmobile,
  author = {\textbf{Prajit Kumar Das} and Ghosh, Dibyajyoti and Joshi, Anupam and Finin, Tim},
  title = {ACM HotMobile 2013 poster: an energy efficient semantic context model for managing privacy on smartphones},
  year = {2013},
  issue_date = {July 2013},
  publisher = {Association for Computing Machinery},
  address = {New York, NY, USA},
  volume = {17},
  number = {3},
  issn = {1559-1662},
  url = {https://doi.org/10.1145/2542095.2542114},
  doi = {10.1145/2542095.2542114},
  journal = {SIGMOBILE Mob. Comput. Commun. Rev.},
  month = nov,
  pages = {34–35},
  numpages = {2},
  abstract = {Modern smartphones are capable of gathering massive amounts of data about a user and her context. While this data is mostly utilized for providing services that are better suited to the user, user data and context leakage from smart phones can have disastrous results. This is especially true as most enterprises are going to a Bring-Your-Own-Device (BYOD) model for mobile devices such as smartphones. We recognize this change as a potential threat to data privacy, both of the user and also of corporations whose data is on employee owned phones. We describe a method to carry out energy efficient privacy preservation on a mobile smart-phone. Our work is based on a study of an Android smartphone's component-wise energy consumption pattern and is based on a three-fold approach to ensure efficient execution of privacy policies, based on user and app context modeled using semantic web technologies.}
}
This file was generated by bibtex2html 1.99.