期刊文献+

面向普适计算的用户隐私量化方法研究 被引量:2

Research on information privacy quantization method facing ubiquitous computing environment
下载PDF
导出
摘要 无论通信系统如何发展,隐私对于用户来说都是最重要的,用户的隐私是否想透露该由用户亲自决断。然而,由于信息互联业务的发展,用户经常被询问隐私信息的请求所打扰。而普适计算是强调用户和环境融为一体的计算,其出发点是想让用户尽量少地参与系统的计算、传输等过程。如果普适计算想要更广泛地得到推广,对隐私发放实现自动控制是根本目标。提出了以用户为中心、以系统为中心、混合量化等多种方法,并在对各种方法进行实验比对,明确其使用环境以及优缺点,在免除打扰用户和隐私保护等方面能达到比较好的平衡性能,可以为将来普适计算中关于隐私的自动防护提供参考。 Privacy is always the most important for users,and whether to disclose the privacy should be decided by themselves.However,users are disturbed by more and more querying for the permission of some privacy with the development of internet service.Ubiquitous computing emphasize that calculation should be in harmony of computation,and user should take part in the process of computing and transmission less as far as possible.Follow one’s inclinations to control the permission of privacy will be necessary for ubiquitous computing if it want to be widely promoted in the future.This paper proposes the user-centric method,system-centric method,hybrid approach and so on.And every approach is compared to show its advantage or disadvantage.Finally,the balance can be gotten between querying user and privacy protecting.All of these can provide experience for control permission of user automatically in ubiquitous computing environment.
作者 王斌 段友祥
出处 《计算机工程与应用》 CSCD 北大核心 2011年第27期1-5,28,共6页 Computer Engineering and Applications
基金 山东省自然科学基金 No.ZR2009GM010~~
关键词 普适计算 隐私保护 用户隐私 ubiquitous computing privacy protecting user privacy
  • 相关文献

参考文献5

  • 1Babbitt R, Wong J, Chang C.Towards the modeling of personal privacy in ubiquitous computing environments[C]//Proc 31st Annual International Computer Software and Applications Conf,2007.
  • 2Hull R, Kumar B, Lieuwen D, et al.Enabling context-aware and privacy-conscious user data sharing[C]//Proc 2004 IEEE International Conf on Mobile Data Management,2004.
  • 3Iachello G,Truong K N,Abowd G D,et al.Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world[C]//Proc SIGCHI Conf on Human Factors in Computing Systems,2006.
  • 4Hong J I,Ng J D, Lederer S, et al.Privacy risk models for designing privacy-sensitive ubiquitous computing systems[C]//Proc 2004 Conf on Designing Interactive Systems,2004.
  • 5Hull R, Kumar B, Lieuwen D, et al.Enabling context-aware and privacy-conscious user data sharing[C]//Proc 2004 IEEE International Conf on Mobile Data Management.2004.

同被引文献11

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部