A XML based, User-centered Privacy Model in Pervasive Computing Systems
نویسندگان
چکیده
The fact that pervasive systems are typically embedded and invisible makes it difficult for users to know when, where, and how these devices are collecting data. So privacy is a major issue for pervasive computing applications and several privacy models have been proposed for pervasive environments. In this paper we present a XML based User-centered Privacy Model (UPM) which provides content, identity, location, and time privacy with low unobtrusiveness.
منابع مشابه
A context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کامل(Work in Progress) User-Tailored Privacy by Design
The “privacy by design” philosophy addresses privacy aspects early in the design and development of an information system. While privacy by design solutions often provide considerable advantages over “post hoc” privacy solutions, they are usually not customized to the needs of individual users. Further, research shows that users differ substantially in their privacy management strategies. Thus,...
متن کاملA NFR-Based Framework for User-Centered Adaptation
Pervasive environments support users’ daily routines in an invisible and unobtrusive way. To do so, they include a technical pervasive infrastructure, which is aware of and adaptive to both the operational context and the users at hand. Non-Functional Requirements (NFRs) have been effectively used to inform decision-making in software engineering: functional alternatives are compared in terms o...
متن کاملPersonalised privacy in pervasive and ubiquitous systems
Our world is edging closer to the realisation of pervasive systems and their integration in our everyday life. While pervasive systems are capable of offering many benefits for everyone, the amount and quality of personal information that becomes available raise concerns about maintaining user privacy and create a real need to reform existing privacy practices and provide appropriate safeguards...
متن کامل