{"title":"融合隐私协商、身份管理和信任管理技术实现普适计算中的隐私","authors":"A. Blazic, K. Dolinar, Jan Porekar","doi":"10.1109/ICDS.2007.12","DOIUrl":null,"url":null,"abstract":"Designing and composing pervasive systems of the next generation networks is a technological as well as social challenge due to its complexity and its unpredictable nature. In such environments a significant amount of information directly related to users are fetched, exchanged, processed and delivered as personalized services. Due to automation of infrastructure both users and services have many agents acting on their behalf. Respectively in pervasive systems one of the most problematic concerns arises on user right to maintain privacy. This paper is focused on instruments to enable and maintain privacy through a subtle fusion of different privacy enabling techniques. We present conceptual privacy enabling architecture of infrastructural pervasive middleware that uses trust management, privacy negotiation and identity management during the inter-entity communication lifecycle. Using this approach balance between the conflicting interest of pervasiveness on one hand and protecting privacy on the other is achieved.","PeriodicalId":348977,"journal":{"name":"First International Conference on the Digital Society (ICDS'07)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Enabling Privacy in Pervasive Computing Using Fusion of Privacy Negotiation, Identity Management and Trust Management Techniques\",\"authors\":\"A. Blazic, K. Dolinar, Jan Porekar\",\"doi\":\"10.1109/ICDS.2007.12\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Designing and composing pervasive systems of the next generation networks is a technological as well as social challenge due to its complexity and its unpredictable nature. In such environments a significant amount of information directly related to users are fetched, exchanged, processed and delivered as personalized services. Due to automation of infrastructure both users and services have many agents acting on their behalf. Respectively in pervasive systems one of the most problematic concerns arises on user right to maintain privacy. This paper is focused on instruments to enable and maintain privacy through a subtle fusion of different privacy enabling techniques. We present conceptual privacy enabling architecture of infrastructural pervasive middleware that uses trust management, privacy negotiation and identity management during the inter-entity communication lifecycle. Using this approach balance between the conflicting interest of pervasiveness on one hand and protecting privacy on the other is achieved.\",\"PeriodicalId\":348977,\"journal\":{\"name\":\"First International Conference on the Digital Society (ICDS'07)\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-01-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"First International Conference on the Digital Society (ICDS'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDS.2007.12\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"First International Conference on the Digital Society (ICDS'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDS.2007.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enabling Privacy in Pervasive Computing Using Fusion of Privacy Negotiation, Identity Management and Trust Management Techniques
Designing and composing pervasive systems of the next generation networks is a technological as well as social challenge due to its complexity and its unpredictable nature. In such environments a significant amount of information directly related to users are fetched, exchanged, processed and delivered as personalized services. Due to automation of infrastructure both users and services have many agents acting on their behalf. Respectively in pervasive systems one of the most problematic concerns arises on user right to maintain privacy. This paper is focused on instruments to enable and maintain privacy through a subtle fusion of different privacy enabling techniques. We present conceptual privacy enabling architecture of infrastructural pervasive middleware that uses trust management, privacy negotiation and identity management during the inter-entity communication lifecycle. Using this approach balance between the conflicting interest of pervasiveness on one hand and protecting privacy on the other is achieved.