Privacy in Pervasive Computing and Open Issues

@article{Bhaskar2007PrivacyIP,
  title={Privacy in Pervasive Computing and Open Issues},
  author={Pankaj Bhaskar and Sheikh Iqbal Ahamed},
  journal={The Second International Conference on Availability, Reliability and Security (ARES'07)},
  year={2007},
  pages={147-154}
}
Privacy appears as a major issue for pervasive computing applications. Several models have been proposed to address privacy challenges. Successful design requires awareness of the technology's users and that their desires and concerns are understood. This is difficult as few empirical researches exist about potential pervasive users that designers can use. Complicating design further is the fact that pervasive systems are typically embedded or invisible, making it difficult for users to know… CONTINUE READING
Highly Cited
This paper has 27 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
Showing 1-10 of 18 extracted citations

BlindLocation: Supporting user location privacy using blind signature

2017 7th International Conference on Computer and Knowledge Engineering (ICCKE) • 2017
View 1 Excerpt

Lessons learned in building pervasive platforms

2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) • 2014
View 1 Excerpt

An internet overlay architecture for global scale wireless sensor networks

2010 Wireless Telecommunications Symposium (WTS) • 2010
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 46 references

Protection of privacy in pervasive computing environments

International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II • 2005
View 5 Excerpts
Highly Influenced

Models, protocols, and architectures for secure pervasive computing: challenges and research directions

IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second • 2004
View 6 Excerpts
Highly Influenced

Location Privacy in Pervasive Computing

IEEE Pervasive Computing • 2003
View 10 Excerpts
Highly Influenced

Nearest Surrounder Search

C. K. Lee, W. C. Lee, H. V. Leung
IEEE International Conference on Data Engineering, • 2006
View 1 Excerpt

Similar Papers

Loading similar papers…