DocumentCode
408013
Title
Using constraints to protect personal location information
Author
Gajparia, Anand S. ; Mitchell, Chris J. ; Yeun, Chan
Author_Institution
Information Security Group, London Univ., Egham, UK
Volume
3
fYear
2003
fDate
6-9 Oct. 2003
Firstpage
2112
Abstract
This paper assesses the possible use of constraints to control the dissemination and use of location information (LI) within a location based service architecture. The various types of constraint which may by required are also considered. Finally, issues and risks with the possible use of constraints are discussed, as are possible solutions to these hazards.
Keywords
mobile radio; telecommunication security; telecommunication services; location based service architecture; personal location information; Emergency services; Europe; Global Positioning System; Hazards; Information security; North America; Privacy; Protection; Telecommunication control; Wireless communication;
fLanguage
English
Publisher
ieee
Conference_Titel
Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th
ISSN
1090-3038
Print_ISBN
0-7803-7954-3
Type
conf
DOI
10.1109/VETECF.2003.1285397
Filename
1285397
Link To Document