Privacy, Security and Trust Related Issues in Pervasive Computing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security, Trust and Privacy – A New Direction for Pervasive Computing

-Information which used to be privileged only for the rich and powerful few has become crucial part of our life. Everyone is now very aware of the need to protect sensitive and valuable information from unintentionally being presented to other individuals or organizations. In the open environment such as the internet, there are suspicious individuals with insincere motives who are cautiously tr...

متن کامل

Towards Security and Privacy for Pervasive Computing

Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional dist...

متن کامل

Trust, Security and Privacy in Global Computing

During the past thirty years, the world of computing has evolved from large centralised computing centres to an increasingly distributed computing environment, where computation and communication capabilities are being embedded in artefacts of everyday life. Billions of computational entities will interact in systems with ever changing configurations determined by local and global context, for ...

متن کامل

Privacy, Security and Trust in Cloud Computing

 Privacy, Security and Trust in Cloud Computing

متن کامل

Privacy and Security Issues in Cloud Computing

Cloud computing is a double-edged sword from the privacy and security standpoints. Despite its potential to provide a low cost security, organizations may increase risks by storing sensitive data in the cloud. In this paper, we analyze how the cloud’s characteristics such as newness, nature of the architecture, and attractiveness and vulnerability as a cybercrime target are tightly linked to pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJARCCE

سال: 2018

ISSN: 2319-5940,2278-1021

DOI: 10.17148/ijarcce.2018.7109