ON PRIVACY CLASSIFICATION IN UBIQUITOUS COMPUTING SYSTEMS
نویسندگان
چکیده
منابع مشابه
Privacy preserving in ubiquitous computing: Classification & hierarchy
In this paper, we adopt the classification of personal information and hierarchy of services to build a privacy system, in which one communicates with each other via pipes with different security levels. In each level, one has the corresponding rights to access each other. The requesters are not able to be infringed based on the personal information that service obtains from service providers. ...
متن کاملPrivacy in Ubiquitous Computing
The advent of Ubiquitous Computing (UbiComp) has brought a set of new challenges along with numerous advantages. The notion of UbiComp was envisioned in 1991 by Marc Weiser in his seminal paper [1] and has become a hot topic ever since. Despite a lot of research conducted in the area, there are still a lot of issues to elaborate on. In this position paper, we describe our concerns about designi...
متن کاملLocation privacy in ubiquitous computing
The field of ubiquitous computing envisages an era when the average consumer owns hundreds or thousands of mobile and embedded computing devices. These devices will perform actions based on the context of their users, and therefore ubiquitous systems will gather, collate and distribute much more personal information about individuals than computers do today. Much of this personal information wi...
متن کاملPrivacy Invasions in Ubiquitous Computing
While recent surveys often cite people who have experienced some form of privacy invasion, the exact nature of such invasions remains elusive. Yet in order to build ubiquitous computing systems that will respect the privacy of the individual, it is crucial to understand when it is exactly that people feel their privacy has been invaded. This paper motivates why privacy is necessary, describes a...
متن کاملEveryday Privacy in Ubiquitous Computing Environments
We present a conceptual model of everyday privacy in ubiquitous computing environments, based on the works of Lessig and Adams. By everyday privacy, we mean the enduser’s ongoing exposure to and control over personal information collection. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing
سال: 2014
ISSN: 2312-5381,1727-6209
DOI: 10.47839/ijc.4.2.334