Evaluating User-centered Privacy Model (UPM) in pervasive computing systems

4Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The fact that pervasive systems are typically embedded and invisible makes it difficult for users to know when, where, and how these devices are collecting data. So privacy is a major issue for pervasive computing applications and several privacy models have been proposed for pervasive environments. In this paper we present the evaluation of a XML based User-centered Privacy Model (UPM) and measure this model unobtrusiveness and discuss privacy policies' expressiveness, and user control over private information. We show that the model provides content, identity, location, and time privacy with low unobtrusiveness while privacy policies are highly expressive and support mandatory and discretionary rules, context sensitivity, uncertainty handling, and conflict resolution. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Dehghantanha, A., Udzir, N. I., & Mahmod, R. (2011). Evaluating User-centered Privacy Model (UPM) in pervasive computing systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6694 LNCS, pp. 272–284). https://doi.org/10.1007/978-3-642-21323-6_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free