Ma et al., 2008 - Google Patents
Privacy preserving in ubiquitous computing: Challenges & issuesMa et al., 2008
- Document ID
- 7430968744178788390
- Author
- Ma T
- Kim S
- Wang J
- Zhao Y
- Publication year
- Publication venue
- 2008 IEEE International Conference on e-Business Engineering
External Links
Snippet
Privacy preservation is crucial in ubiquitous computing environment. Without this, users feel uneasy to use and live in the UC environment. The implementation of privacy safeguard or privacy enhancing technologies is going to be a long road. Understanding the challenges & …
- 230000002708 enhancing 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Langheinrich | Privacy by design—principles of privacy-aware ubiquitous systems | |
Langheinrich | � Privacy in Ubiquitous Computing | |
Chalhoub et al. | “It did not give me an option to decline”: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products | |
Friedewald et al. | Privacy, identity and security in ambient intelligence: A scenario analysis | |
US20110029398A1 (en) | Geo name service for validated locations and occupants and URLs | |
Beslay et al. | Digital territory: bubbles | |
Voas et al. | Human tagging | |
Tyagi et al. | Future challenging issues in location based services | |
Mavroudis et al. | Eavesdropping whilst you're shopping: Balancing personalisation and privacy in connected retail spaces | |
Soppera et al. | Maintaining privacy in pervasive computing—enabling acceptance of sensor-based services | |
Friedewald et al. | The brave new world of ambient intelligence: An analysis of scenarios regarding privacy, identity and security issues | |
Spiekermann et al. | Privacy enhancing technologies for RFID-a critical state-of-the-art report | |
Jedrzejczyk et al. | I know what you did last summer: risks of location data leakage in mobile and social computing | |
Ma et al. | Privacy preserving in ubiquitous computing: Challenges & issues | |
Ruiz et al. | Combining of NFC, BLE and physical web technologies for objects authentication on IoT scenarios | |
Lemos | Locative media and surveillance at the boundaries of informational territories | |
Pandit et al. | Conceptual framework and a critical review for privacy preservation in context aware systems | |
Ko et al. | A study on the security algorithm for contexts in smart Cities | |
Hassan et al. | The internet of things privacy | |
Salonen | Evaluating the security and privacy of near field communication–case: Public transportation | |
Sabzevar et al. | Authentication, authorisation and auditing for ubiquitous computing: a survey and vision | |
Lee et al. | Privacy protection for a secure u-city life | |
Konomi | Personal privacy assistants for RFID users | |
Dehghantanha et al. | A XML based, User-centered Privacy Model in Pervasive Computing Systems | |
Miraoui et al. | A context-aware authentication approach for smartphones |