A Privacy Preference Model for Pervasive Computing
نویسندگان
چکیده
Widespread acceptance of e-government and m-government (and for that matter pervasive-Government) services will only take place when citizens are satisfied that personal data is stored, transmitted and processed with respect to their privacy. We compare and contrast data protection regimes found around the World and suggest that these have directly influenced the uptake of existing private-sector mobile services. Citizen uptake of e-government services will be encouraged by strong regulatory regimes dedicated to the protection of personal data. Consumers will entrust personal data where they can exert some measure of control over the release of that data to other parties. We examine a number of such controlling mechanisms and suggest a new privacy architecture intended for mobile service provision.
منابع مشابه
A context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملA XML based, User-centered Privacy Model in Pervasive Computing Systems
The fact that pervasive systems are typically embedded and invisible makes it difficult for users to know when, where, and how these devices are collecting data. So privacy is a major issue for pervasive computing applications and several privacy models have been proposed for pervasive environments. In this paper we present a XML based User-centered Privacy Model (UPM) which provides content, i...
متن کاملModeling Privacy Control in Context-Aware Systems
M any worry that existing privacy problems will only worsen in context-aware pervasive computing environments. 1,2 Ubiquitous sensing and the invisible form factor of embedded computing devices have made it easier than ever to collect and use information about individuals without their knowledge. Sensitive private information might live indefinitely and appear anywhere at anytime. Moreover, the...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005