The years coming promise to bring new area of information technology, transferring it from scientists minds into reality, on one hand a new paradigm known as pervasive calm, ubiquitous computing, or pervasive computing has the ability to overcome a lot of inefficiencies of the current information systems while on the other hand central blocks of pervasive computing are in direct conflicts with privacy protection fundamentals. This book reviews current issues in identity, location, and time privacy in pervasive computing ...
Read More
The years coming promise to bring new area of information technology, transferring it from scientists minds into reality, on one hand a new paradigm known as pervasive calm, ubiquitous computing, or pervasive computing has the ability to overcome a lot of inefficiencies of the current information systems while on the other hand central blocks of pervasive computing are in direct conflicts with privacy protection fundamentals. This book reviews current issues in identity, location, and time privacy in pervasive computing systems and evaluates existing privacy models. Finally it describes a privacy model that provides user control over identity, time, and location. The book offers interesting evaluation methods for user control over private information, unobtrusiveness of privacy policies, and privacy models scalability.
Read Less