期刊文献+

一个普适计算环境中的定位隐私保护模型 被引量:3

Location privacy protect model for pervasive computing
下载PDF
导出
摘要 随着普适计算技术的发展,在普适环境中的应用服务也日益增多。这些服务通常都是基于用户位置的服务,然而,用户的定位信息中往往直接或间接地包含着用户的隐私内容。针对如何在获取个性化定制服务的同时保护用户的定位隐私这一问题展开讨论,提出了一种定位信息采集和假名使用的策略,并基于该策略建立了一个普适计算环境中的定位隐私保护模型。 With the development of pervasive computing technologies, the applications in ubicom environment was increasing. Those application usually based on user' s location information, which included user' s privacy information directly or indirectly. This paper discussed how to protect user' s location privacy while personalized service was provided. Proposed user' s location information acquisition policy and pseudonym policy and built a model for protect user policy of pervasive computing based on those policy.
出处 《计算机应用研究》 CSCD 北大核心 2009年第6期2110-2112,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60473090) 四川省科技公关计划资助项目(03GG007-007)
关键词 普适计算 智能空间 无线网络 定位隐私 隐私保护 pervasive computing smart space wireless network location privacy privacy protect
  • 相关文献

参考文献8

  • 1BERESFORD A, STAJANO F. Location privacy in pervasive computing[J]. IEEE Pervasive Computing, 2003,2( 1 ) :46-55.
  • 2ORLACH G, HEINEMANN A, TERPSTRA W W. Survey on location privacy in pervasive computing[ C]//Proc of Workshop on Security and Privacy in Pervasive Computing. Honand:Kluwer Acedemic Publisher,2004:23- 34.
  • 3ADLY N, STEGGLES P, HARTER A. SPIRIT:a resource database for mobile users[ C]//Proc of ACM CHI'97 Workshop on Ubiquitous Computing. New York : ACM Press, 1997.
  • 4NAGUIB H, COULOURIS G, MITCHELL S. Middleware support for context-aware multimedia applications [ C ]//Proc of the 3rd Int'l Conference on Distributed Applications and Interoperable Systems. Norwell, Mass : Kluwer Academic Publishers ,2001:9-22.
  • 5ENGLISH C, NIXON P, TERZIS S, et al. Dynamic trust models for ubiquitous computing environments[ C ]//Proc of Workshop on Security in Ubiquitous Computing. Goteborg: [ s. n. ] ,2002.
  • 6SHANKAR N, ARBAUGH W A. On trust for ubiquitous computing [ C]//Proc of Workshop on Security in Ubiquitous Computing. Goteborg : IEEE Computer Society,2002:44- 54.
  • 7SHAND B, DIMMOCK N, BACON J. Trust for Ubiquitous,transparent collaboration [ C ]//Proc of the 1st IEEE International Conference on Pervasive Computing and Communications. Washington DC: IEEE Computer Society,2003 : 153-160.
  • 8WINSLETT M,YU T, SEAMONS K,et al. Trust negotiation on the Web[J]. IEEE Internet Computing,2002,6(6) :30-37.

同被引文献50

  • 1谢鸿波,周明天.基于概率和条件逻辑的PKI信任模型推理[J].小型微型计算机系统,2006,27(1):69-71. 被引量:3
  • 2WEISER M.The computer for the twenty-first century[J].Scientific American.1991,265(3):94-104.
  • 3WARRIOR J,MCHENRY E,MCGEE K.They know where you are[J].Spectrum,IEEE.2003,40(7):20-25.
  • 4ADAMS P M,ASHWELL G,BAXTER R.Location-based services-an overview of the standards[J].BT Technology Journal.2003,21(1):34-43.
  • 5WESTIN A.Privacy and freedom[M].New York:Atheneum,1967.
  • 6BAUGH J,GUO J.Location privacy in mobile computing environments[J].Ubiquitous Intelligence and Computing.2006,4159:936-945.
  • 7CVRCEK D,KUMPOST M,MATYAS V,et al.A study on the value of location privacy[C].The 5th ACM Workshop on Privacy in Electronic Society.Alexandria,Virginia,USA:ACM,2006:109-118.
  • 8BOWEN III C L,MARTIN T L.A survey of location privacy and an approach for solitary users[C].Big Island:40th Annual Hawaii International Conference on System Sciences 2007,IEEE.Computer Society,2007.
  • 9SNEKKENES E.Concepts for personal location privacy policies[C].Tampa:The 3rd ACM Conference on Electronic Commerce,ACM,2001:48-57.
  • 10PROCE B A,ADAM K,NUSEIBEH B.Keeping ubiquitous computing to yourself a practical model for user control of privacy[J].International Journal of Human-Computer Studies,2005,63(1-2):228-235.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部