Documents

A Trust-Based Approach to Control Privacy Exposure In

Description
ggh
Categories
Published
of 15
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Transcript
  A trust-based Approach to Control Privacy Exposure in UbiquitousComputing Environments By: TesfayeZ.email: tesfuzewduab@gmail.com Bahirdar/Ethiopia  Executive Summery ã  A tradeoffexists in these systems: the more sources of data andthe higher fidelity in those sources which can improve  people’s decision, the more privacy reduction. ã there is generally no a priori trustrelationship ã we first show how trust evaluationprocess of the user’s system can be based on previousinteractions and peer recommendations. ã  A solutionthen relied on trust to control privacy disclosure isproposed that depends on pre-defined privacy policy.  Background ã Defined as 'present everywhere’ ã is also described as Pervasive Computing; ã appear everywhere and anywhere in contrast to that of desktop computing ã Ubiquitous Computing devices are tiny, invisible microprocessors embedded in any type of objects like clothes,home,cars,watchesetc., ã How it differ from traditional computing?Limited BW and Geographical positions will changes  Introductions  Manage information quickly, efficiently  Removes complexity of new technologies.  Convenient access  High Security risk i.e. exposure personal informatios  Vulnerability

Example

Apr 9, 2018
Search
Tags
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks