Modeling privacy compromise: visibility of individuals via DRM and RFID in ubiquitous computing.
Nhan TranVijay SomersPublished in: SpringSim (2008)
Keyphrases
- ubiquitous computing
- rfid technology
- rfid systems
- context aware
- context awareness
- ambient intelligence
- radio frequency identification
- everyday life
- computing devices
- physical world
- physical environment
- ubiquitous computing environments
- human activities
- everyday objects
- mobile computing
- pervasive computing
- ubiquitous systems
- context aware computing
- context aware systems
- supply chain
- physical objects
- low cost
- privacy preserving
- learning algorithm
- ubiquitous computing technology
- smart spaces
- mobile communications
- data collection