DocumentCode :
3283142
Title :
Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment
Author :
Asif, KM ; Ahamed, Sheikh I. ; Talukder, Nilothpal
Author_Institution :
Marquette Univ., Milwaukee
Volume :
2
fYear :
2007
fDate :
24-27 July 2007
Firstpage :
269
Lastpage :
274
Abstract :
Users of handheld devices may want to share services resources with each other in pervasive computing environment. Availability of information regarding users may lead to privacy violations while communicating with others for services and resources. Providing a model to resolve this issue in centralized or distributed environment is not desirable or not feasible if we really want to achieve ubiquity. In this paper, we present a privacy aware model for resource sharing in pervasive computing environment with an illustrative example. Our model exploits the concepts of policies and ordered binary decision diagrams.
Keywords :
ad hoc networks; binary decision diagrams; data privacy; resource allocation; telecommunication security; ubiquitous computing; ad hoc network; handheld device; ordered binary decision diagram; pervasive computing; privacy violation; resource sharing; Ad hoc networks; Availability; Boolean functions; Data structures; Handheld computers; Personal digital assistants; Pervasive computing; Privacy; Resource management; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International
Conference_Location :
Beijing
ISSN :
0730-3157
Print_ISBN :
0-7695-2870-8
Type :
conf
DOI :
10.1109/COMPSAC.2007.84
Filename :
4291135
Link To Document :
بازگشت