Trust Based Privacy Protection Method in Pervasive Computing

In pervasive computing environments, resources and services are usually provided by a variety of different suppliers with multiple computing devices and from heterogeneous networks. Accordingly, various privacy protection methods with lots of privacy policies were used. Before some meaningful interaction starts or services offers, a certain level of trust must be established, this trust establishment and communication process may involve privacy information exchange. Consequently, a method for integrate the privacy protection methods and deal with privacy and trust tradeoff is necessary. In this paper, the authors propose a novel trust based privacy protection method by using a three levels Trust based Privacy Protection Model (TPPM).

Provided by: Academy Publisher Topic: Security Date Added: Feb 2012 Format: PDF

Download Now

Find By Topic