Security

Trust Based Privacy Protection Method in Pervasive Computing

Free registration required

Executive Summary

In pervasive computing environments, resources and services are usually provided by a variety of different suppliers with multiple computing devices and from heterogeneous networks. Accordingly, various privacy protection methods with lots of privacy policies were used. Before some meaningful interaction starts or services offers, a certain level of trust must be established, this trust establishment and communication process may involve privacy information exchange. Consequently, a method for integrate the privacy protection methods and deal with privacy and trust tradeoff is necessary. In this paper, the authors propose a novel trust based privacy protection method by using a three levels Trust based Privacy Protection Model (TPPM).

  • Format: PDF
  • Size: 662.17 KB