z-logo
open-access-imgOpen Access
Privacy preserving in ubiquitous computing: Classification & hierarchy
Author(s) -
Tinghuai Ma,
Sen Yan,
Jin Wang,
Sungyoung Lee
Publication year - 2011
Publication title -
computer science and information systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.244
H-Index - 24
eISSN - 2406-1018
pISSN - 1820-0214
DOI - 10.2298/csis110315055m
Subject(s) - computer science , hierarchy , personally identifiable information , computer security , ubiquitous computing , internet privacy , service provider , service (business) , privacy software , information privacy , human–computer interaction , business , marketing , economics , market economy
In this paper, we adopt the classification of personal information and hierarchy of services to build a privacy system, in which one communicates with each other via pipes with different security levels. In each level, one has the corresponding rights to access each other. The requesters are not able to be infringed based on the personal information that service obtains from service providers. Privacy system can decrease the interaction, while in other circumstance the system strengthens and enhances the privacy preserving. Thus we strike a balance between two goals of Ubiquitous Computing: interaction and privacy preserving.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom