Information Assurance, Privacy, and Security in Ubiquitous Questionnaire

被引:4
|
作者
Goto, Yuichi [1 ]
Cheng, Jingde [1 ]
机构
[1] Saitama Univ, Dept Informat & Comp Sci, Saitama 3388570, Japan
关键词
D O I
10.1109/FCST.2009.111
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ubiquitous questionnaire is to provide users with E-questionnaire services anytime and anywhere such that one can use E-questionnaire servers without even thinking about them. An E-questionnaire server for ubiquitous questionnaire should provide guarantees to satisfy any user-specified requirement on information assurance, privacy, and security because some questionnaires may concern organization secrets as well as personal privacy, and some questionnaires such as E-voting or E-testing must impose restrictions on and provide assurance to respondents, voters, and/or testees. Until now, there is no detail requirement analysis for information assurance, privacy, and security in ubiquitous questionnaire. To implement an questionnaire server server for ubiquitous questionnaire, this paper presents a requirement analysis for information assurance, privacy, and security in ubiquitous questionnaire. The paper identifies all participants and their information assets in ubiquitous questionnaire with a general purpose E-questionnaire server that can be used not only an E-questionnaire server but also an E-voting server and an E-testing server, gives a threat analysis of and a requirement analysis for information assurance, privacy, and security, and investigates technical issues for implementing facilities satisfied the requirements.
引用
收藏
页码:619 / 624
页数:6
相关论文
共 50 条
  • [1] Capturing semantics for information security and privacy assurance
    Chowdhury, Mohammad M. R.
    Chamizo, Javier
    Noll, Josef
    Gomez, Juan Miguel
    [J]. UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 105 - +
  • [2] Privacy Law Protection Based on the Information Security Assurance Algorithm
    Wang, Zhanjiang
    Yue, Qifeng
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [3] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [4] Personal and Ubiquitous ComputingIssue on privacy and security
    Chris Schmandt
    Mark Ackerman
    [J]. Personal and Ubiquitous Computing, 2004, 8 : 389 - 390
  • [5] Security and Privacy in Ubiquitous Sensor Networks
    Perez, Alfredo J.
    Zeadally, Sherali
    Jabeur, Nafaa
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2018, 14 (02): : 286 - 308
  • [6] A Case Study: The Deficiency of Information Security Assurance Practice of a Financial Institute in the Protection of Privacy Information
    Ng, R.
    Dong, L.
    [J]. 2008 FIRST IEEE INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING AND WORKSHOPS, PROCEEDINGS, 2008, : 332 - 337
  • [7] Personal and Ubiquitous Computing Issue on privacy and security
    Schmandt, Chris
    Ackerman, Mark
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2004, 8 (06) : 389 - 390
  • [8] INFORMATION SECURITY AND PRIVACY
    Bui, Tung
    Clemons, Eric
    Streff, Kevin
    [J]. PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 4702 - 4702
  • [9] Information security and privacy
    Pieprzyk, J
    Safavi-Naini, R
    [J]. AUSTRALIAN COMPUTER JOURNAL, 1999, 31 (02): : 33 - 33
  • [10] Information Security Threats and Information Assurance
    Yalman, Yildiray
    Yesilyurt, Murat
    [J]. TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2013, 2 (03): : 247 - 252