Bruce Sterling, When Blobjects Rule The Earth, SIGGRAPH, Los Angeles, 2004
                                     retreived ...
So, how do you deal with privacy concerns in a
      pervasive computing environment?
The Virtual Wall model
Virtual Walls: Protecting Digital Privacy in Pervasive
                    Environments
                            A. Kap...
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Security in Pervasive Computing Environments
Upcoming SlideShare
Loading in …5
×

Security in Pervasive Computing Environments

578 views

Published on

a brief presentation on several approaches to managing security in pervasive computing environments.

Won\'t make any damn sense without my notes, which are: not attached

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
578
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
25
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security in Pervasive Computing Environments

  1. 1. Bruce Sterling, When Blobjects Rule The Earth, SIGGRAPH, Los Angeles, 2004 retreived 18/08/08, from http://www.viridiandesign.org/notes/401-450/00422_the_spime.html
  2. 2. So, how do you deal with privacy concerns in a pervasive computing environment?
  3. 3. The Virtual Wall model
  4. 4. Virtual Walls: Protecting Digital Privacy in Pervasive Environments A. Kapadia, T. Henderson, J.J. Fielding David Kotz Proceedings of the 5th International Conference on Pervasive Computing, number 4480 in LNCS, pages 162- 179, Toronto, Canada, May 2007. Springer-Verlag.

×