{"title":"Privacy-concern for context-aware environments","authors":"T. Shoji, T. Nakajima","doi":"10.1109/WSTFEUS.2004.10015","DOIUrl":null,"url":null,"abstract":"Context-aware computing offers attractive services by collecting information from various sensors, and the services are adapted according to the current condition of the real world. However, the danger of overflowing personal information is also getting high because the data retrieved by the sensors usually contain privacy information. In this paper, we study on the tradeoff between privacy and the quality of services, and we present the design of our system that we are currently developing. Our proposed system controls the tradeoff according to a user's requirement, and guarantees the trustworthy of the management of privacy information.","PeriodicalId":170872,"journal":{"name":"Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2004-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WSTFEUS.2004.10015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Context-aware computing offers attractive services by collecting information from various sensors, and the services are adapted according to the current condition of the real world. However, the danger of overflowing personal information is also getting high because the data retrieved by the sensors usually contain privacy information. In this paper, we study on the tradeoff between privacy and the quality of services, and we present the design of our system that we are currently developing. Our proposed system controls the tradeoff according to a user's requirement, and guarantees the trustworthy of the management of privacy information.