期刊文献+

普适家庭医疗系统中的隐私保护模型

Privacy Preserving Model for Ubiquitous Home Medical Systems
下载PDF
导出
摘要 针对普适家庭医疗系统(UHMS)中用户的隐私保护问题,提出UHMS中一种基于改进的角色访问控制策略、P3P技术标准和第三方可信机构的认证隐私保护模型——uPPM。模型基本实体包括用户、隐私控制中心和家庭医疗中心,其实质是将信息隐藏技术、隐私偏好策略和代理技术有机结合以适用于普适计算的特性——上下文感知。基于BAN逻辑分析论证了该模型的正确性和安全性。 In order to protect users' privacy in UHMS, this paper proposes a privacy preserving model for authentication, ubiquitous home medical system authentication privacy preserving model uPPM. The proposed model uses Platform for Privacy Preference(P3P) standard technology, improves Role-Based Access Control(RBAC) policy and credible third-party organization. There are three basic entities in model, including users, privacy control center and home medical center. The model combines with information hiding technology, privacy preferences strategies and agent technology organically to adapt to the characteristics of pervasive computing context-aware. It is analyzed and proved to be correct and safe by the model based on BAN logic.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第3期287-289,共3页 Computer Engineering
基金 国家自然科学基金资助重大项目(90718034) 湖南省杰出青年科学基金资助项目(07JJ1010)
关键词 上下文感知 隐私保护 基于角色访问控制 隐私偏好平台 BAN逻辑 context-aware privacy preserving Role-Based Access Control(RBAC) Platform for Privacy Preference(P3P) BAN logic
  • 相关文献

参考文献6

  • 1Jang S J.Ubiquitous Home Healthcare Management System with Early Warning Reporting[C]//Proc.of the 2007 International Conference on Convergence Information Technology.Gyeongju,Korea:[s.n.],2007:2394-2401.
  • 2徐光祐,史元春,谢伟凯.普适计算[J].计算机学报,2003,26(9):1042-1050. 被引量:258
  • 3Kim K.Multi-Policy Access Control Considering Privacy in Ubiquitous Environment[C]//Proc.of the 2006 International Conference on Hybrid Information Technology.Jeju Island,Korea:[s.n.],2006:216-222.
  • 4Hong S H.RBAC-based Access Control Framework for Ensuring Privacy in Ubiquitous Computing[C]//Proc.of the 2006 International Conference on Hybrid Information Technology.Jeju Island,Korea:[s.n.],2006:278-283.
  • 5吴江栋,李伟华,安喜锋.基于RBAC的细粒度访问控制方法[J].计算机工程,2008,34(20):52-54. 被引量:23
  • 6Burrows M,Abadi M.A Logic of Authentication[J].ACM Transactions on Computer Systems,1990,8(1):18-36.

二级参考文献46

  • 1周文峰,尤军考,何基香.基于RBAC模型的权限管理系统设计与实现[J].微计算机信息,2006(05X):35-36. 被引量:25
  • 2Abowd G D, Dey A K, Brown P J, Davies N, Smith M,Steggles P. Towards a better understanding of context and context-awareness. In: Gellersen H Wed. Handheld and Ubiquitous Computing. Berlin: Springer, 1999. 304-307.
  • 3Castro P, Muntz R. Managing context data for smart spaces.IEEE Personal Communications, 2000, 7(5): 44-46.
  • 4Weiser M. The computer for the twenty-first century. Scientific American, 1991, 265(3): 94-104.
  • 5Dertouzos M. The future of computing. Scientific American,1999, 282(3): 52-63.
  • 6Norman D. The Invisible Computer. Cambridge, Mass: MIT Press, 1999.
  • 7Garlan D, Siewiorek D P, Smailagic A, Steenkiste P. Project aura: Toward distraction-free pervasive computing. IEEE Pervasive Computing, 2002, 1(4-6): 22-31.
  • 8Salz P. The disappearing computer. Time Europe, 2000, 155(8) : 1-8.
  • 9Vernier F, Leash N, Shen C. Visualization techniques for circular tabletop interfaces. MERL Cambridge Research, MA,USA:Technical Report: TR2002-01, 2002.
  • 10Xie Wei-Kai, Shi Yuan-Chun, Xu Guan-You. Smart classroom—— An intelligent environment for tele-education. In:Proceedings of the 2nd IEEE Pacific-Rim Conference on Multimedia, Beijing, China, 2001. 662-668.

共引文献279

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部