Modeling privacy compromise: visibility of individuals via DRM and RFID in ubiquitous computing

  • Authors:
  • Nhan Tran;Vijay Somers

  • Affiliations:
  • Ryerson University, Toronto, Ontario, Canada;Ryerson University, Toronto, Ontario, Canada

  • Venue:
  • Proceedings of the 2008 Spring simulation multiconference
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The increasing prevalence of ubiquitous computing (UC) mediums presents many unique security and privacy challenges. Digital Right Management (DRM) technologies and Radio Frequency Identification (RFID) technology are at the frontier of UC and are the subject of modern privacy concerns. This paper will discus both technologies and relating issues, and in addition we propose a Compromise Privacy Model (CPM) based on information gathered by DRM and RFID. Such model may be use to show how extensively our privacy is compromised.