Safeguarding personal data using trusted computing in pervasive computing

被引:0
|
作者
Hohl, A [1 ]
Zugenmaier, A [1 ]
机构
[1] Univ Freiburg, IIG Telemat, D-7800 Freiburg, Germany
关键词
privacy; policy enforcement; trusted computing; attestation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pervasive computing can be divided into computing on personal wearable devices and computing in a smart infrastructure. When a wearable device communicates personal data for further processing to the infrastructure, privacy concerns arise. This paper presents an approach to dispel concerns relating to improper use of personal data based on digital rights management technology. A prototype implementation of this approach in a smart hospital environment is described.
引用
下载
收藏
页码:147 / 155
页数:9
相关论文
共 50 条
  • [31] Protected Computing vs. Trusted Computing
    Mana, Antonio
    Munoz, Antonio
    2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2006, : 14 - +
  • [32] Challenges for Trusted Computing
    Sadeghi, Ahmad-Reza
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414
  • [33] Privacy and trusted computing
    Reid, J
    Nieto, JMG
    Dawson, E
    Okamoto, E
    14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 383 - 388
  • [34] Trusted computing in context
    Schneider, Fred B.
    IEEE SECURITY & PRIVACY, 2007, 5 (02) : 4 - 5
  • [35] Trusted computing for infrastructure
    1600, Telefonaktiebolaget L.M. Ericsson (91):
  • [36] Challenges for Trusted Computing
    Balfe, Shane
    Gallery, Eimear
    Mitchell, Chris J.
    Paterson, Kenneth G.
    IEEE SECURITY & PRIVACY, 2008, 6 (06) : 60 - 66
  • [37] Pairings in Trusted Computing
    Chen, Liqun
    Morrissey, Paul
    Smart, Nigel P.
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2008, 2008, 5209 : 1 - +
  • [38] TRUSTED COMPUTING UPDATE
    ABRAMS, MD
    JOYCE, MV
    COMPUTERS & SECURITY, 1995, 14 (01) : 57 - 68
  • [39] Mobile Trusted Computing
    Asokan, N.
    Ekberg, Jan-Erik
    Kostiainen, Kari
    Rajan, Anand
    Rozas, Carlos
    Sadeghi, Ahmad-Reza
    Schulz, Steffen
    Wachsmann, Christian
    PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1189 - 1206
  • [40] Modeling Trusted Computing
    CHEN Shuyi
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1507 - 1510