Information Technology Reference
In-Depth Information
4Conluon
In this paper we showed that the UPM could provide users full control over
private information by providing user control over content, identity, location,
and time privacy. The model is highly scalable because of its distributed deci-
sion making processes and its platform independence and its unobtrusiveness
is less than 10%. Finally we showed that the UPM policies are able to support
mandatory and discretionary rules, context sensitivity, uncertainty handling, and
conflict resolution to provide high expressiveness. This research can be extended
to the following areas:
1. Adding mechanisms to support concurrent, multiple authentication methods
to increase the accuracy of the user APL that increases the model privacy.
2. Applying secret sharing techniques to overcome the probability of collusion
attack that can result from the collusion of light houses and portals that will
divulge parties private information, this technique can be used for eliminat-
ing the software trust-ability assumption too.
3. Adding ontology to the model that allows devices to communicate with-
out any information of their XML schema format or any prior agreement
about it.
References
1. Ranganathan, A., Al-Muhtadi, J., Biehl, J., Ziebart, B., Campbell, R.H., Bailey,
B.: Towards a pervasive computing benchmark. In: 3rd International Conf. on
Pervasive Computing and Communications Workshop, pp. 194-198 (2005)
2. Bhaskar, P., Sheikh, S.I.: Privacyin Pervasive Computing and Open Issues. In: In-
ternational Conference on Availability, Reliability, and Security, pp. 110-118 (2007)
3. Cheng, H.S., Zhang, D., Tan, J.G.: Protection of Privacy in Pervasive Computing
Environments. In: International Conference on Information Technology: Coding
and Computing, pp. 242-247 (2005)
4. Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Per-
vasive Computing 2(2), 40-46 (2003)
5. Beresford, A.R., Stajano, F.: Mix Zones- User Privacy in Location-aware Services.
In: International Workshop on Pervasive Computing and Communication Security.
IEEE, Los Alamitos (2004)
6. Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-
based applications. IEEE Pervasive Computing 2(1), 56-64 (2003)
7. Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mikunas, M.D.:
Towards Security and Privacy for Pervasive Computing. In: Proceeding of Inter-
national Symposium on Software Security (2002)
8. Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Envi-
ronments. In: Ubicomp, pp.72-74 (2006)
9. Myles, G., Firday, A., Davies, N.: Preserving privacy in environments with location-
based applications. IEEE Pervasive Computing 2(1), 56-64 (2003)
Search WWH ::




Custom Search