ON PRIVACY CLASSIFICATION IN UBIQUITOUS COMPUTING SYSTEMS

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy preserving in ubiquitous computing: Classification & hierarchy

In this paper, we adopt the classification of personal information and hierarchy of services to build a privacy system, in which one communicates with each other via pipes with different security levels. In each level, one has the corresponding rights to access each other. The requesters are not able to be infringed based on the personal information that service obtains from service providers. ...

متن کامل

Privacy in Ubiquitous Computing

The advent of Ubiquitous Computing (UbiComp) has brought a set of new challenges along with numerous advantages. The notion of UbiComp was envisioned in 1991 by Marc Weiser in his seminal paper [1] and has become a hot topic ever since. Despite a lot of research conducted in the area, there are still a lot of issues to elaborate on. In this position paper, we describe our concerns about designi...

متن کامل

Location privacy in ubiquitous computing

The field of ubiquitous computing envisages an era when the average consumer owns hundreds or thousands of mobile and embedded computing devices. These devices will perform actions based on the context of their users, and therefore ubiquitous systems will gather, collate and distribute much more personal information about individuals than computers do today. Much of this personal information wi...

متن کامل

Privacy Invasions in Ubiquitous Computing

While recent surveys often cite people who have experienced some form of privacy invasion, the exact nature of such invasions remains elusive. Yet in order to build ubiquitous computing systems that will respect the privacy of the individual, it is crucial to understand when it is exactly that people feel their privacy has been invaded. This paper motivates why privacy is necessary, describes a...

متن کامل

Everyday Privacy in Ubiquitous Computing Environments

We present a conceptual model of everyday privacy in ubiquitous computing environments, based on the works of Lessig and Adams. By everyday privacy, we mean the enduser’s ongoing exposure to and control over personal information collection. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computing

سال: 2014

ISSN: 2312-5381,1727-6209

DOI: 10.47839/ijc.4.2.334