Cognitive Privacy for Personal Clouds

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Flexible Replication for Personal Clouds

People own an increasing number of personal devices ranging from mobile phones and laptops to tablet and desktop computers. In addition, it is more and more common to rent cloud storage resources from utility computing providers. We call this new computing environment a user’s Personal Cloud. Managing data in such a heterogeneous environment requires a large effort on the user side. Given the s...

متن کامل

Privacy for Personal Neuroinformatics

Human brain activity collected in the form of Electroencephalography (EEG), even with low number of sensors, is an extremely rich signal. Traces collected from multiple channels and with high sampling rates capture many important aspects of participants’ brain activity and can be used as a unique personal identifier, similarly to fingerprints, DNA, or a portrait. The motivation for sharing EEG ...

متن کامل

Personal Lifelong User Model Clouds

This paper explores an architecture for very long term user modelling, based upon personal user model clouds. These ensure that the individual’s applications can access their model whenever it is needed. At the same time, the user can control the use of their user model. So, they can ensure it is accessed only when and where they wish, by applications that they wish. We consider the challenges ...

متن کامل

Clarifying Privacy in the Clouds

Concomitant with the increased market appeal of cloud-based services, there is growing concern over issues of privacy within the architecture. In this paper, we analyze what is meant by the term privacy from a legal perspective, and how the meaning of cloud computing and their operation may be affected in at least one jurisdiction. We also look at some possible solutions to addressing privacy i...

متن کامل

Towards Personal Privacy Control

In this paper we address the realization of personal privacy control in pervasive computing. We argue that personal privacy demands differ substantially from those assumed in enterprise privacy control. This is demonstrated by introducing seven requirements specific for personal privacy, which are then used for the definition of our privacy policy language, called SenTry. It is designed to take...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mobile Information Systems

سال: 2016

ISSN: 1574-017X,1875-905X

DOI: 10.1155/2016/7107103