Privacy Preserving in Ubiquitous Computing: Challenges & Issues

被引:2
|
作者
Ma, Tinghuai [1 ]
Kim, Shin-Dug [2 ]
Wang, Jun [1 ]
Zhao, Yawei [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp, Nanjing, Peoples R China
[2] Yonsei Univ, Dept Comp Sci, Seoul 120749, South Korea
[3] Grad Univ, Chinese Acad Sci, Beijing 100864, Peoples R China
来源
PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING | 2008年
关键词
D O I
10.1109/ICEBE.2008.55
中图分类号
F [经济];
学科分类号
02 ;
摘要
Privacy preservation is crucial in ubiquitous computing environment. Without this, users feel uneasy to use and live in the UC environment. The implementation of privacy safeguard or privacy enhancing technologies is going to be a long road Understanding the challenges & issues of privacy protected in ubiquitous computing, is helpful to design and implement privacy aware system. In this paper, we try to describe privacy in ubiquitous computing briefly. The challenges, which are different from usually system, are presented. In the implementation view, some issues are addressed.
引用
收藏
页码:297 / +
页数:3
相关论文
共 50 条
  • [41] Privacy Context Model for Dynamic Privacy Adaptation in Ubiquitous Computing
    Schaub, Florian
    Koenings, Bastian
    Dietzel, Stefan
    Weber, Michael
    Kargl, Frank
    UBICOMP'12: PROCEEDINGS OF THE 2012 ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING, 2012, : 752 - 757
  • [42] Privacy issues of combining ubiquitous computing and software agent technology in a life-critical environinent
    Eymann, T
    Morito, H
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5627 - 5632
  • [43] Smart Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INFORMATION AND INTERACTION, PT II, 2009, 5618 : 131 - 139
  • [44] Software design issues for ubiquitous computing
    Abowd, GD
    IEEE COMPUTER SOCIETY WORKSHOP ON VLSI '98 - SYSTEM LEVEL DESIGN, PROCEEDINGS, 1998, : 104 - 109
  • [45] Opportunities for privacy and trust in the development of ubiquitous computing
    Heesen, Jessica
    Siemoneit, Oliver
    INTERNATIONAL REVIEW OF INFORMATION ETHICS, 2007, 8 : 47 - 52
  • [46] Software engineering issues for ubiquitous computing
    Abowd, Gregory D.
    Proceedings - International Conference on Software Engineering, 1999, : 75 - 84
  • [47] Personal and Ubiquitous Computing Issue on privacy and security
    Schmandt, Chris
    Ackerman, Mark
    PERSONAL AND UBIQUITOUS COMPUTING, 2004, 8 (06) : 389 - 390
  • [48] In Search of User Privacy Protection in Ubiquitous Computing
    Cleveland, Simon
    2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2012, : 694 - 699
  • [49] An effective method for location privacy in ubiquitous computing
    Lee, G
    Kim, W
    Kim, DK
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 1006 - 1015
  • [50] Privacy protection by typing in ubiquitous computing systems
    Siewe, Francois
    Yang, Hongji
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 120 : 133 - 153