• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Security in Pervasive Computing Environments
 

Security in Pervasive Computing Environments

on

  • 775 views

a brief presentation on several approaches to managing security in pervasive computing environments.

a brief presentation on several approaches to managing security in pervasive computing environments.

Won\'t make any damn sense without my notes, which are: not attached

Statistics

Views

Total Views
775
Views on SlideShare
775
Embed Views
0

Actions

Likes
0
Downloads
20
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Security in Pervasive Computing Environments Security in Pervasive Computing Environments Presentation Transcript

    • Bruce Sterling, When Blobjects Rule The Earth, SIGGRAPH, Los Angeles, 2004 retreived 18/08/08, from http://www.viridiandesign.org/notes/401-450/00422_the_spime.html
    • So, how do you deal with privacy concerns in a pervasive computing environment?
    • The Virtual Wall model
    • Virtual Walls: Protecting Digital Privacy in Pervasive Environments A. Kapadia, T. Henderson, J.J. Fielding & David Kotz Proceedings of the 5th International Conference on Pervasive Computing, number 4480 in LNCS, pages 162- 179, Toronto, Canada, May 2007. Springer-Verlag.