[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ma et al., 2008 - Google Patents

Privacy preserving in ubiquitous computing: Challenges & issues

Ma et al., 2008

Document ID
7430968744178788390
Author
Ma T
Kim S
Wang J
Zhao Y
Publication year
Publication venue
2008 IEEE International Conference on e-Business Engineering

External Links

Snippet

Privacy preservation is crucial in ubiquitous computing environment. Without this, users feel uneasy to use and live in the UC environment. The implementation of privacy safeguard or privacy enhancing technologies is going to be a long road. Understanding the challenges & …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
Langheinrich Privacy by design—principles of privacy-aware ubiquitous systems
Langheinrich � Privacy in Ubiquitous Computing
Chalhoub et al. “It did not give me an option to decline”: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products
Friedewald et al. Privacy, identity and security in ambient intelligence: A scenario analysis
US20110029398A1 (en) Geo name service for validated locations and occupants and URLs
Beslay et al. Digital territory: bubbles
Voas et al. Human tagging
Tyagi et al. Future challenging issues in location based services
Mavroudis et al. Eavesdropping whilst you're shopping: Balancing personalisation and privacy in connected retail spaces
Soppera et al. Maintaining privacy in pervasive computing—enabling acceptance of sensor-based services
Friedewald et al. The brave new world of ambient intelligence: An analysis of scenarios regarding privacy, identity and security issues
Spiekermann et al. Privacy enhancing technologies for RFID-a critical state-of-the-art report
Jedrzejczyk et al. I know what you did last summer: risks of location data leakage in mobile and social computing
Ma et al. Privacy preserving in ubiquitous computing: Challenges & issues
Ruiz et al. Combining of NFC, BLE and physical web technologies for objects authentication on IoT scenarios
Lemos Locative media and surveillance at the boundaries of informational territories
Pandit et al. Conceptual framework and a critical review for privacy preservation in context aware systems
Ko et al. A study on the security algorithm for contexts in smart Cities
Hassan et al. The internet of things privacy
Salonen Evaluating the security and privacy of near field communication–case: Public transportation
Sabzevar et al. Authentication, authorisation and auditing for ubiquitous computing: a survey and vision
Lee et al. Privacy protection for a secure u-city life
Konomi Personal privacy assistants for RFID users
Dehghantanha et al. A XML based, User-centered Privacy Model in Pervasive Computing Systems
Miraoui et al. A context-aware authentication approach for smartphones