A Framework of Evaluation Location Privacy in Mobile Network
نویسندگان
چکیده
منابع مشابه
network of phonological rules in lori dialect of andimeshk: a study within the framework of post-generative approach.
پژوهش حاضر ارائه ی توصیفی است از نظام آوایی گویش لری شهر اندیمشک، واقع در شمال غربی استان خوزستان. چهارچوب نظری این پژوهش، انگاره ی پسازایشی جزءمستقل می باشد. این پایان نامه شامل موارد زیر است: -توصیف آواهای این گویش به صورت آواشناسی سنتی و در قالب مختصه های زایشی ممیز، همراه با آوانوشته ی تفصیلی؛ -توصیف نظام آوایی گویش لری و قواعد واجی آن در چهارچوب انگاره ی پسازایشی جزءمستقل و معرفی برهم کن...
Location Privacy in Mobile IPv6
The Mobile IPv6 protocol includes a route optimization mechanism that improves routing efficiency by informing correspondent nodes about the current care-of address of the mobile node. Mobile node physical location may be associated with its topologically correct IP address. Revealing the mobile node’s care-of address can therefore be used to track the mobile with certain accuracy, which compro...
متن کاملA Unified Framework for Location Privacy
We introduce a novel framework that provides a logical structure for classifying and organizing fundamental components and concepts of location privacy. Our framework models mobile networks and applications, threats, location-privacy preserving mechanisms, and metrics. We demonstrate the relevance of our framework by showing how the existing proposals in the field of location privacy are embodi...
متن کاملPrivacy for Location Data in Mobile Networks
The new EU Directive 2002/58/EC has introduced with its Art. 9 special protection for location data other than traffic data. In this paper, we argue that also location data within traffic data can contain sensitive information about the ”relative positioning” and ”co-located displacements” of mobile nodes and thus also requires special protection. After a brief introduction to how mobility is s...
متن کاملPreserving Location Privacy in Mobile Edge Computing
The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2013
ISSN: 1877-0509
DOI: 10.1016/j.procs.2013.05.112