Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering

This article presents an approach for the design of location-based information systems that support privacy functionality. Privacy-enhancing technology (PET) has been available for a considerable amount of time. New online applications and infrastructures for mobile and ubiquitous use have been installed. This has been done without usage of available PET, although they are favored by data prote...

متن کامل

Service scenarios - A socio-technical approach to business service modeling

The paper presents and discusses the notion of service scenarios. A service is work done by a service executor in interaction with a service consumer. A service scenario is a model of a service system and the roles that are played by the actors that participate and interact during the execution of a service. The model represents the roles and the interactions between the participants. Service s...

متن کامل

Service security and privacy as a socio-technical problem

The security and privacy of the data that users transmit, more or less deliberately, to modern services is an open problem. It is not solely limited to the actual Internet traversal, a sub-problem vastly tackled by consolidated research in security protocol design and analysis. By contrast, it entails much broader dimensions pertaining to how users approach technology and understand the risks f...

متن کامل

A uniformity-based approach to location privacy

As location-based services emerge, many people feel exposed to high privacy threats. Privacy protection is a major challenge for such services and related applications. A simple approach is perturbation, which adds an artificial noise to positions and returns an obfuscated measurement to the requester. Our main finding is that, unless the noise is chosen properly, these methods do not withstand...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Theoretical and Applied Electronic Commerce Research

سال: 2007

ISSN: 0718-1876

DOI: 10.3390/jtaer2030018