Cognitive Privacy for Personal Clouds
نویسندگان
چکیده
منابع مشابه
Flexible Replication for Personal Clouds
People own an increasing number of personal devices ranging from mobile phones and laptops to tablet and desktop computers. In addition, it is more and more common to rent cloud storage resources from utility computing providers. We call this new computing environment a user’s Personal Cloud. Managing data in such a heterogeneous environment requires a large effort on the user side. Given the s...
متن کاملPrivacy for Personal Neuroinformatics
Human brain activity collected in the form of Electroencephalography (EEG), even with low number of sensors, is an extremely rich signal. Traces collected from multiple channels and with high sampling rates capture many important aspects of participants’ brain activity and can be used as a unique personal identifier, similarly to fingerprints, DNA, or a portrait. The motivation for sharing EEG ...
متن کاملPersonal Lifelong User Model Clouds
This paper explores an architecture for very long term user modelling, based upon personal user model clouds. These ensure that the individual’s applications can access their model whenever it is needed. At the same time, the user can control the use of their user model. So, they can ensure it is accessed only when and where they wish, by applications that they wish. We consider the challenges ...
متن کاملClarifying Privacy in the Clouds
Concomitant with the increased market appeal of cloud-based services, there is growing concern over issues of privacy within the architecture. In this paper, we analyze what is meant by the term privacy from a legal perspective, and how the meaning of cloud computing and their operation may be affected in at least one jurisdiction. We also look at some possible solutions to addressing privacy i...
متن کاملTowards Personal Privacy Control
In this paper we address the realization of personal privacy control in pervasive computing. We argue that personal privacy demands differ substantially from those assumed in enterprise privacy control. This is demonstrated by introducing seven requirements specific for personal privacy, which are then used for the definition of our privacy policy language, called SenTry. It is designed to take...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mobile Information Systems
سال: 2016
ISSN: 1574-017X,1875-905X
DOI: 10.1155/2016/7107103