Security & privacy

被引:1
|
作者
Hong, Jason [1 ]
Satyanarayan, Mahadev
Cybenko, George
机构
[1] Carnegie Mellon Univ, Human Comp Interact Inst, Pittsburgh, PA 15213 USA
[2] Dartmouth Coll, Hanover, NH 03755 USA
关键词
D O I
10.1109/MPRV.2007.74
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread deployment of sensor-based systems, wireless networking, mobile and embedded devices, and other pervasive computing technologies have posed greater risks to security and privacy. Researchers have been developing secure pervasive computing systems and maintain appropriate levels of privacy for users, covering all aspects of pervasive computing, including hardware, operating systems, networks, databases, user interfaces, and applications. Improvements in wireless networking can also help address security and privacy concerns and another important consideration when designing pervasive computing systems is the user interface for security and privacy functions. Another important aspect of the user experience is how the system lets people manage their privacy and models are being developed for using physical, social, and experiential knowledge to decide what level of utility and pnvacy a new technology offers.
引用
收藏
页码:15 / 17
页数:3
相关论文
共 50 条
  • [1] Usable Security and Privacy for Security and Privacy Workers
    Zurko, Mary Ellen
    Haney, Julie
    [J]. IEEE SECURITY & PRIVACY, 2023, 21 (01) : 8 - 10
  • [2] Security and Privacy
    Dutta, Ashutosh
    Hammad, Eman
    Enright, Michael
    Behmann, Fawzi
    Chorti, Arsenia
    Cheema, Ahmad
    Kadio, Kassi
    Urbina-Pineda, Julia
    Alam, Khaled
    Limam, Ahmed
    Chu, Fred
    Lester, John
    Park, Jong-Geun
    Bio-Ukeme, Joseph
    Pawar, Sanjay S.
    Layton, Roslyn
    Ramchandran, Prakash
    Okonkwo, Kingsley
    Ong, Lyndon
    Emmelmann, Marc
    Issa, Omneya
    Arul, Rajakumar
    Malik, Sireen
    Krishnan, Sivarama
    Sugumar, Suresh
    Lala, Tk
    Borst, Matthew
    Kloza, Brad
    [J]. 2022 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2022,
  • [3] Security and privacy
    Geer, D
    Gong, L
    Ranum, M
    Neuman, C
    Zurko, ME
    [J]. IEEE CONCURRENCY, 2000, 8 (02): : 70 - 79
  • [4] Security and Privacy
    Davies, N
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 20 - 20
  • [5] Security and Privacy
    Dutta, Ashutosh
    Hammad, Eman
    Enright, Michael A.
    Chorti, Arsenia
    Pawar, Sanjay S.
    Urbina-Pineda, Julia
    Kurt, Gunes Karabulut
    Cheema, Ahmad Raza
    Taha, Sajid
    Chng, Baw
    Rawal, Bharat S.
    de Carvalho, Glaucio H. S.
    [J]. 2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [6] Privacy and Security
    Consolvo, Sunny
    Hong, Jason
    Langheinrich, Marc
    [J]. IEEE PERVASIVE COMPUTING, 2015, 14 (01) : 16 - 17
  • [7] Security and Privacy: Why Privacy Matters
    Bird, Stephanie J.
    [J]. SCIENCE AND ENGINEERING ETHICS, 2013, 19 (03) : 669 - 671
  • [8] Security and Privacy: Why Privacy Matters
    Stephanie J. Bird
    [J]. Science and Engineering Ethics, 2013, 19 : 669 - 671
  • [9] The ethics of trading privacy for security: The multifaceted effects of privacy on liberty and security
    Satra, Henrik Skaug
    [J]. TECHNOLOGY IN SOCIETY, 2022, 68
  • [10] Privacy and Security Making Security Sustainable
    Anderson, Ross
    [J]. COMMUNICATIONS OF THE ACM, 2018, 61 (03) : 24 - 26