Data protection and data sharing in telematics
Mobile Networks and Applications
A Privacy Enhanced Service Architecture for Mobile Users
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Privacy and identity management for everyone
Proceedings of the 2005 workshop on Digital identity management
A Privacy Service for Context-aware Mobile Computing
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Context-aware trust and privacy application for mobile identification system
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Usability improvements for WLAN access
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction design and usability
Toward risk assessment as a service in cloud environments
HotCloud'10 Proceedings of the 2nd USENIX conference on Hot topics in cloud computing
Hi-index | 0.00 |
Hotspot services will be offered in small, highly-populated public places like airports, hospitals, etc. They will play their assistive roles in the people's life only if they are secure, trusted, and nonobtrusive. Some of the challenges faced are the seamless operation between WLAN-based hotspots and other emerging wireless data networks technologies, for example body sensor networks; the exploitation of context- and location-aware information provided from the hotspot service; matching the user needs with differentiated services; preserving the privacy of the user's sensitive data and anonymity. To answer these challenges, a new solution for context-aware privacy protection for any type of fine-grained user sensitive data with profiles of the user, context, scenario and service is proposed. Based on assessment of current context and situation, the user delegates actions for protecting his privacy to the proposed mechanism that acts on his behalf. The discussed solution is presented with a medical scenario. Components model, interaction sequence, algorithm for privacy safeguarding and system implementation are described.