The vision of upcoming ubiquitous computing environment allows us to exchange and share information with any parties any time, anywhere if we want. However, the widespread use of computing devices and sensors networked together could be a considerable threat to the privacy of individuals living in the ubiquitous computing environment. In the paper, we investigate privacy issues in the ubiquitous computing environment and present a model of privacy protection and an example architecture to support it. The proposed architecture ensures that individuals not only get benefits and services from ubiquitous environment by freely exchanging and sharing information, but they also preserve their own privacy. © Springer-Verlag 2004.
CITATION STYLE
Hwang, S. O., & Yoon, K. S. (2004). Privacy protection in ubiquitous computing based on privacy label and information flow. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3044, 46–54. https://doi.org/10.1007/978-3-540-24709-8_6
Mendeley helps you to discover research relevant for your work.