Data Privacy Ontology for Ubiquitous Computing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Privacy Ontology for Ubiquitous Computing

Privacy is an ability to understand, choose, and regulate what personal data one shares, with whom, for how long and under what context. Data owners must not lose the rights of ownership, once the data is shared. Privacy decisions have many components that include identity, access granularity, time and context. We propose an ontology based model for data privacy configuration in terms of produc...

متن کامل

Privacy in Ubiquitous Computing

The advent of Ubiquitous Computing (UbiComp) has brought a set of new challenges along with numerous advantages. The notion of UbiComp was envisioned in 1991 by Marc Weiser in his seminal paper [1] and has become a hot topic ever since. Despite a lot of research conducted in the area, there are still a lot of issues to elaborate on. In this position paper, we describe our concerns about designi...

متن کامل

Location privacy in ubiquitous computing

The field of ubiquitous computing envisages an era when the average consumer owns hundreds or thousands of mobile and embedded computing devices. These devices will perform actions based on the context of their users, and therefore ubiquitous systems will gather, collate and distribute much more personal information about individuals than computers do today. Much of this personal information wi...

متن کامل

Privacy Factors for Successful Ubiquitous Computing

Certain privacy principles have been established by industry, (e.g. USCAM, 2006). Over the past two years, we have been trying to understand whether such principles reflect the concerns of the ordinary citizen. We have developed a method of enquiry which displays a rich context to the user in order to elicit more detailed information about those privacy factors that underpin our acceptance of u...

متن کامل

Privacy Invasions in Ubiquitous Computing

While recent surveys often cite people who have experienced some form of privacy invasion, the exact nature of such invasions remains elusive. Yet in order to build ubiquitous computing systems that will respect the privacy of the individual, it is crucial to understand when it is exactly that people feel their privacy has been invaded. This paper motivates why privacy is necessary, describes a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2017

ISSN: 2156-5570,2158-107X

DOI: 10.14569/ijacsa.2017.080120