An ontology for privacy policy management in ubiquitous environments

被引:0
|
作者
Fondazzi Martimiano, Luciana Andreia [1 ]
Pereira Goncalves, Mueller Roberto [1 ]
Moreira, Edson dos Santos [1 ]
机构
[1] Univ Sao Paulo, Inst Ciencias Matemat & Computacao, Departamento Sistemas Computacao, Sao Carlos, SP, Brazil
关键词
privacy policies; ontology; PSN; wireless networks; mobile management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The SOHand (Service Oriented Handover) architecture supports ubiquitous systems handovers, allowing the user to take control of the session and to migrate, transparently, between wireless technologies and providers (access and content ones). To ensure that the handovers will be done with no problems while users are using services, such architecture uses a set of ontologies called DOHand (Domain Ontology for Handovers). The ontologies will help the negotiation process between the different agents involved. Additionally, as users migrate in their daily duties and activities, they will eventually want to communicate with each other, in an ad-hoc way, to exchange information or to share device/network resources, such as memory, processing, email and bandwidth, in opportunistic ways in a strategy named PSN (Pocket Switched Network). Be it in an infra-structured or ad-hoc way, during the interactions the users need to have a good notion of risk and trust to their partners. They need to define privacy policies that must be negotiated between the parts during the inter-providers handovers; and they need to assess the potential of danger during an opportunistic exchange. In this paper, we describe PrOHand (Privacy Ontology for Handovers), which is an extension of DOHand privacy concept. PrOHand supports privacy policies management, handling information and services used by the SOHand users during infrastructured and PSN interactions. A case study is described in which PrOHand is instantiated for the haggle architecture.
引用
收藏
页码:947 / 950
页数:4
相关论文
共 50 条
  • [1] Smart Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    [J]. HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INFORMATION AND INTERACTION, PT II, 2009, 5618 : 131 - 139
  • [2] Ad hoc Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    Cap, Clemens H.
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN-ORIENTED AND PERSONALIZED MECHANISM, TECHNOLOGIES, AND SERVICES, 2009, : 85 - 90
  • [3] An ontology-based framework for dynamic resource management in ubiquitous computing environments
    Pandis, I
    Soldatos, J
    Paar, A
    Reuter, J
    Carras, M
    Polymenakos, L
    [J]. ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 195 - 202
  • [4] A Novel Approach for Ontology Distribution in Ubiquitous Environments
    Feki, Mohamed Ali
    Mokhtari, Mounir
    Ibrahim, Ismail Khalil
    [J]. INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2007, 2 (3-4) : 225 - 231
  • [5] A Design of Ontology Context Model in Ubiquitous Learning Environments
    Cho, Dae Jea
    Hong, Myoung Woo
    [J]. PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS , PTS 1-3: NEW ASPECTS OF COMPUTERS, 2008, : 844 - +
  • [6] Privacy Policy Enforcement for Ambient Ubiquitous Services
    Oyomno, Were
    Jappinen, Pekka
    Kerttula, Esa
    [J]. AMBIENT INTELLIGENCE, 2010, 6439 : 265 - 269
  • [7] Mobility management in ubiquitous environments
    Chiung-Ying Wang
    Hsiao-Yun Huang
    Ren-Hung Hwang
    [J]. Personal and Ubiquitous Computing, 2011, 15 : 235 - 251
  • [8] Mobility management in ubiquitous environments
    Wang, Chiung-Ying
    Huang, Hsiao-Yun
    Hwang, Ren-Hung
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2011, 15 (03) : 235 - 251
  • [9] Towards the modeling of personal privacy in ubiquitous computing environments
    Babbitt, Ryan
    Wong, Johnny
    Chang, Carl
    [J]. COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 695 - +
  • [10] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856