Trust based privacy protection method in pervasive computing

被引:2
|
作者
Gao, Feng [1 ]
He, Jingsha [2 ]
Ma, Shunan [1 ]
机构
[1] College of Computer Science and Technology, Beijing 100124, China
[2] School of Software Engineering Beijing University of Technology, Beijing 100124, China
关键词
17;
D O I
10.4304/jnw.7.2.322-328
中图分类号
学科分类号
摘要
引用
收藏
页码:322 / 328
相关论文
共 50 条
  • [1] Protection of privacy in pervasive computing environments
    Cheng, HS
    Zhang, DQ
    Tan, JG
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
  • [2] Reusable Pseudonym Privacy Protection in Pervasive Computing
    Guo, Yimin
    Guo, Yajun
    [J]. ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 2, 2011, 105 : 201 - 205
  • [3] Trust Based Pervasive Computing
    Shane Balfe
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1477 - 1480
  • [4] Research of privacy protection in smart space model based on Pervasive Computing
    Jia, Zongpu
    Li, Gang
    Wang, Hongmei
    Fu, Caihong Huang
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 508 - 511
  • [5] Pervasive Context Sharing in Magpie: Adaptive Trust-Based Privacy Protection
    Liu, Chenguang
    Julien, Christine
    [J]. MOBILE COMPUTING, APPLICATIONS, AND SERVICES (MOBICASE 2015), 2015, 162 : 122 - 139
  • [6] A Study of Trust & Privacy Models in Pervasive Computing Approach to Trusted Computing Platforms
    Khiabani, Hamed
    Ab Manan, Jamalul-Lail
    Sidek, Zailani Mohamed
    [J]. 2009 INTERNATIONAL CONFERENCE FOR TECHNICAL POSTGRADUATES (TECHPOS 2009), 2009, : 140 - +
  • [7] Shadow: A middleware in pervasive computing environment for user controllable privacy protection
    Lu, Wentian
    Li, Jun
    Tao, Xianping
    Ma, Xiaoxing
    Lu, Jian
    [J]. SMART SENSING AND CONTEXT, PROCEEDINGS, 2006, 4272 : 143 - +
  • [8] Cloud computing data privacy protection method based on blockchain
    He, Yingjun
    Ouyang, Wenhui
    Li, Shaolong
    Wang, Lin
    Zhou, Jing
    Su, Wenwei
    Li, Shenzhang
    Mei, Donghui
    Shi, Yan
    Jin, Yanxu
    Li, Chenglin
    Ren, Yonghui
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (05) : 480 - 492
  • [9] Location privacy in pervasive computing
    Beresford, AR
    Stajano, F
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 46 - 55
  • [10] Philosophy, privacy, and pervasive computing
    Michelfelder, Diane
    [J]. AI & SOCIETY, 2010, 25 (01) : 61 - 70