Enabling Privacy in Pervasive Computing Using Fusion of Privacy Negotiation, Identity Management and Trust Management Techniques.
Aleksej Jerman BlazicKajetan DolinarJan PorekarPublished in: ICDS (2007)
Keyphrases
- identity management
- pervasive computing
- access control
- trust management
- personal information
- cloud computing
- trust evaluation
- computing environments
- pervasive computing environments
- user centric
- ambient intelligence
- trust relationships
- context awareness
- trust negotiation
- data security
- privacy preserving data mining
- mobile computing
- private information
- privacy preserving
- multi agent
- ubiquitous computing
- cooperative
- service discovery
- smart home
- virtual communities
- service providers