Privacy protection in ubiquitous computing based on privacy label and information flow

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The vision of upcoming ubiquitous computing environment allows us to exchange and share information with any parties any time, anywhere if we want. However, the widespread use of computing devices and sensors networked together could be a considerable threat to the privacy of individuals living in the ubiquitous computing environment. In the paper, we investigate privacy issues in the ubiquitous computing environment and present a model of privacy protection and an example architecture to support it. The proposed architecture ensures that individuals not only get benefits and services from ubiquitous environment by freely exchanging and sharing information, but they also preserve their own privacy. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Hwang, S. O., & Yoon, K. S. (2004). Privacy protection in ubiquitous computing based on privacy label and information flow. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3044, 46–54. https://doi.org/10.1007/978-3-540-24709-8_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free