- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
Avoiding privacy violations caused by context-sensitive services
Avoiding Privacy Violations Caused by Context-Sensitive Services
Urs Hengartner
University of Waterloo
uhengart@cs.uwaterloo.ca
Peter Steenkiste
Carnegie Mellon University
prs@
Abstract
The increasing availability of information about people’s
context makes it possible to deploy context-sensitive ser-
vices, where access to resources provided or managed by
a service is limited depending on a person’s context. For
example, a location-based service can require an individ-
ual to be at a particular location in order to let the indi-
vidual use a printer or learn her friends’ location. How-
ever, constraining access to a resource based on confiden-
tial information about a person’s context could result in
privacy violations. For instance, if access is constrained
based on a person’s location, granting or rejecting access
will provide information about this person’s location and
could violate the person’s privacy. We introduce an access-
control algorithm that avoids privacy violations caused by
context-sensitive services. Our algorithm exploits the con-
cepts of access-rights graphs, which represent all the infor-
mation that needs to be collected in order to make a context-
sensitive access decision. Moreover, we introduce hidden
constraints, which keep some of this information secret and
thus allow for more flexible access control. We present
a distributed, certificate-based access-control architecture
for context-sensitive services that avoids privacy violations,
a sample implementation, and a performance evaluation.
1. Introduction
The increasing numbers of networked devices (e.g., cell-
phones or handhelds) that individuals are carrying and of
networked sensors (e.g., cameras) let more context-sensitive
information about people become electronically available.
This trend enables the deployment of context-sensitive ser-
vices, where access to resources provided or managed by a
service depends on a person’s context. For instance, many
pervasive computing projects pro
您可能关注的文档
- and Operator Theory.pdf
- AND-302-No Interop No Security How to Build Interoperable Web Service Security.pdf
- Anderson 艾德盛 型号对照表.pdf
- andritz-report-2006-en-customer-projects-rolling-mills-and-strip-processing-lines.pdf
- android 自动调整屏幕分辨率.pdf
- Android4.4(4.2)_RDA5991 WIFI3in1调试方法V1.2.pdf
- Android5.0竖向瀑布流RecyclerView+CardView.pdf
- Android_2.2_r1_API中文文档——ImageView.ScaleType.pdf
- Android自动化测试之Monkeyrunner常用操作编程.pdf
- Android题整理.doc
- AVRX1000快速安装.pdf
- Axial mixing and segregation in a gas-liquid-solid three-phase fluidized bed of solid particles of d.pdf
- AXPsSGRs Magnetars or Quark-stars.pdf
- AZ GXR 601 presentation.pdf
- Azimuthal Angle Correlations for Rapidity Separated Hadron Pairs in d+Au Collisions at sqrt.pdf
- Azimuthal angle decorrelation of Mueller-Navelet jets at NLO.pdf
- Azimuthal Angle Distribution in $B to K^ (to K pi) ell^+ ell^- $ at low invariant $m_{ell^+.pdf
- B1.5 Netzer超轻薄精密电编码器、容栅尺.pdf
- B NA OTOMASYON S STEM RNEK PROJE.pdf
- B156HW01 V4.pdf
文档评论(0)