Privacy engineering in ubiComp

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the ubiquitous age, privacy will be the matter of trade-offs about pros and cons of revealing personal information for personalized services. Ubiquitous computing demands a fundamental shift in the control of personal information and requires disclosure of personal information. As we enjoy comfortable life, the invasion of personal information can be occurred at the same time. The privacy requires the effective security, but the effective security does not guarantee the effective privacy. We present the privacy engineering in order to prevent the privacy invasion and measure the economic value of privacy. We hope this privacy engineering in ubiComp will be used as one of the tool for protecting the users in the ubiquitous age. The approach includes the followings; the architecture of the privacy engineering, the database modeling, the privacy impact assessment, the economic value assessment of the privacy. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Kim, T. J., Lee, S. W., & Lee, E. Y. (2005). Privacy engineering in ubiComp. In Lecture Notes in Computer Science (Vol. 3482, pp. 1279–1288). Springer Verlag. https://doi.org/10.1007/11424857_136

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free