2008 IEEE International Conference on E-Business Engineering 2008
DOI: 10.1109/icebe.2008.55
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving in Ubiquitous Computing: Challenges & Issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Traditional solutions to these issues are based on three steps, namely: user's identification (user declares his identity), authentication (the system verify the authenticity of this claims) and authorisation (user is granted specific access rights) [46]. However, these issues have only recently being addressed in ubiquitous environments [29], whereby they also contrast with the need for natural forms of interaction that do not require active intervention by the user. One initiative that seeks to address this issue of ubiquitous interaction is that of Ambient Intelligence (AmI) [1].…”
Section: In Our Scenario Greg Plays a Treasure Game What Happens Ifmentioning
confidence: 99%
“…Traditional solutions to these issues are based on three steps, namely: user's identification (user declares his identity), authentication (the system verify the authenticity of this claims) and authorisation (user is granted specific access rights) [46]. However, these issues have only recently being addressed in ubiquitous environments [29], whereby they also contrast with the need for natural forms of interaction that do not require active intervention by the user. One initiative that seeks to address this issue of ubiquitous interaction is that of Ambient Intelligence (AmI) [1].…”
Section: In Our Scenario Greg Plays a Treasure Game What Happens Ifmentioning
confidence: 99%
“…There have been many works in the area of privacy preserving in ubiquitous computing [17], [23], [24]. They emphasized the importance of privacy preserving, clarified the problems that we must not ignore.…”
Section: Related Workmentioning
confidence: 99%
“…Meanwhile, privacy concerns regarding IoT devices have arisen over the past decades as IoT ecosystems rapidly expand to industries, cities, houses, and personal wearable devices [6][7][8]. Sensor data are highly detailed, precise, and personal.…”
Section: Introductionmentioning
confidence: 99%