earticle

논문검색

Classification of Privacy Management Techniques in Pervasive Computing

초록

영어

Context awareness, the ability to adapt to the needs of each user, is a fundamental property of pervasive computing systems. Context information is created by tracking the actions and collecting real-time user data, such as location or body temperature. As the system collects more information about its users, the quality of its context-aware services increases, and so does a potential threat to the users’ privacy if the context information is compromised. This paper surveys a wide range of existing pervasive computing systems that address this complex problem, and provides a generalized classification of privacy management techniques used by these systems. A comparative analysis of the surveyed systems and their privacy features is also presented.

목차

Abstract.
 1 Introduction
 2 Background and Motivation
 3 Privacy Management Techniques in PCE
  3.1 Access Rights and Policy Management
  3.2 Classification of Resources
  3.3 Data Persistence Control
  3.4 Granularity Awareness
  3.5 Constraints and Permissions
  3.6 Ownership of Context Information
  3.7 Information Flow Obfuscation
  3.8 Service Access Protection
  3.9 Information Disclosure Protection
  3.10. Protection of Information Usage
 4 Summary
 5 References

저자정보

  • Stan Kurkovsky Central Connecticut State University 1615 Stanley Street, New Britain, CT 060505, USA
  • Oscar Rivera Central Connecticut State University 1615 Stanley Street, New Britain, CT 060505, USA
  • Jay Bhalodi Central Connecticut State University 1615 Stanley Street, New Britain, CT 060505, USA

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.