Uncertain privacy decision about access personal information in pervasive computing environments

被引:0
|
作者
Zhang, Qingsheng [1 ]
Qi, Yong [1 ]
Hou, Di [1 ]
Zhao, Jizhong [1 ]
Han, Huawei [1 ]
机构
[1] Xian Jiaotong Univ, Sch Elect & Informat Engn, Xian 710049, Shaanxi, Peoples R China
关键词
D O I
10.1109/FSKD.2007.598
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In pervasive computing environments, context-aware applications provide services for people by using personal information. People also make privacy decision about personal information disclosure as privacy concerns. Privacy decision depends on people's interaction situation. The trust of information collector and personal information sensitivity often enable people to make uncertain privacy decision. Therefore, we construct a fuzzy objective information system that consists of personal interaction situation history. The privacy disclosure policies are extracted from this information system under using rough set theory. The context-aware applications are assigned to an adequate privacy role with the privacy disclosure policies and situation of people's interaction. Finally, we provide a working example and the initial performance evaluation.
引用
收藏
页码:156 / 160
页数:5
相关论文
共 50 条
  • [21] Towards the modeling of personal privacy in ubiquitous computing environments
    Babbitt, Ryan
    Wong, Johnny
    Chang, Carl
    [J]. COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 695 - +
  • [22] User Access of Public Shared Devices in Pervasive Computing Environments
    Jea, David
    Yap, Ian
    Srivastava, Mani
    [J]. 2007 JOINT WORKSHOP ON HIGH CONFIDENCE MEDICAL DEVICES, SOFTWARE AND SYSTEMS AND MEDICAL DEVICE PLUG-AND PLAY INTEROPERABILITY, 2007, : 57 - 63
  • [23] Exploiting information relationships for access control in pervasive computing
    Hengartner, Urs
    Steenkiste, Peter
    [J]. PERVASIVE AND MOBILE COMPUTING, 2006, 2 (03) : 344 - 367
  • [24] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856
  • [25] Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability
    Ren, Kui
    Lou, Wenjing
    [J]. MOBILE NETWORKS & APPLICATIONS, 2007, 12 (01): : 79 - 92
  • [26] Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability
    Kui Ren
    Wenjing Lou
    [J]. Mobile Networks and Applications, 2007, 12 : 79 - 92
  • [27] A capability-based privacy-preserving scheme for pervasive computing environments
    Konidala, DM
    Duc, DN
    Lee, D
    Kim, K
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, WORKSHOPS, 2005, : 136 - 140
  • [28] A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS
    Yao Lin Kong Xiangwei Wu Guowei Fan Qingna Lin Chi(School of Electronics & Information Engineering
    [J]. Journal of Electronics(China), 2010, 27 (01) : 68 - 78
  • [29] A context-aware access control model for pervasive computing environments
    Emami, Sareh Sadat
    Amini, Morteza
    Zokaei, Saadan
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 51 - +
  • [30] Enabling Location Privacy in Pervasive Computing by Fragmenting Location Information of Users
    Jacob, Jeeva Susan
    Preetha, K. G.
    [J]. ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2012, 305 : 364 - 371