The widespread prevalence of pervasive devices and applications has raised the concerns of privacy. Granting Access to Resources and Context sensitive information causes information leakage through inference or obfuscation. Again, the open and dynamic collaborative environment of pervasive computing has rendered the traditional access control models like Role based models to be unfit. Even though Trust based models came to rescue in such circumstances, privacy is mostly compromised in the big picture. In this paper, we have drawn examples from pervasive computing environment and illustrated some scenarios of privacy violation. We have presented a trust based access control model for pervasive healthcare environment to prevent information le...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that rais...
Abstract — Pervasive computing environments have by definition three main inherent properties; extre...
Proliferation of small handheld devices and wireless technologies has kindled the phenomenon of perv...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
Pervasive environments are characterized by ubiquitous, mobile and embedded computing devices and wi...
The increasing availability of information about people's context makes it possible to deploy c...
Rapid advances in computing technology have made it possible to create a pervasive computing environ...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
Users of handheld devices may want to share services resources with each other in pervasive computin...
Privacy appears as a major issue for pervasive computing applications. Several models have been prop...
Access control to confidential information in pervasive computing environments is challenging for mu...
We describe our current work in developing novel mechanisms for managing security and privacy in per...
CCNC'2012 CeHPSA Workshop (Consumer eHealth Platforms, Services and Applications)International audie...
Privacy is an important aspect of pervasive and ubiquitous computing systems, and, in particular, pe...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that rais...
Abstract — Pervasive computing environments have by definition three main inherent properties; extre...
Proliferation of small handheld devices and wireless technologies has kindled the phenomenon of perv...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
Pervasive environments are characterized by ubiquitous, mobile and embedded computing devices and wi...
The increasing availability of information about people's context makes it possible to deploy c...
Rapid advances in computing technology have made it possible to create a pervasive computing environ...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
Users of handheld devices may want to share services resources with each other in pervasive computin...
Privacy appears as a major issue for pervasive computing applications. Several models have been prop...
Access control to confidential information in pervasive computing environments is challenging for mu...
We describe our current work in developing novel mechanisms for managing security and privacy in per...
CCNC'2012 CeHPSA Workshop (Consumer eHealth Platforms, Services and Applications)International audie...
Privacy is an important aspect of pervasive and ubiquitous computing systems, and, in particular, pe...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that rais...
Abstract — Pervasive computing environments have by definition three main inherent properties; extre...