Title : 
How and How Much Should We Disclose?
         
        
            Author : 
Dong, Kai ; Lu, Wentian ; Qin, Zhen ; Huang, Yu ; Tao, Xianping ; Lu, Jian
         
        
            Author_Institution : 
Dept. of Comput. Sci. & Technol., Nanjing Univ., Nanjing
         
        
        
        
        
        
        
            Abstract : 
Privacy risks result in great barriers to the long-term success of pervasive computing. Unfortunately, related researches can still be considered in its infancy. Access control is widely used for privacy protection. However, traditional access control methods can only negating or approving accesses, greatly lacking flexibility. In this paper, we introduce the disclosing degree for end-users to precisely and flexibly specify their privacy requirements. We implement a disclosing degree based scheme in the middleware Shadow for privacy protection. We also demonstrate the effectiveness of our scheme by comprehensive case-studies.
         
        
            Keywords : 
data privacy; middleware; ubiquitous computing; Shadow middleware; access control; disclosing degree; pervasive computing; privacy protection; privacy risks; Computerized monitoring; Costs; Databases; Distributed control; Energy consumption; Energy storage; Memory; Query processing; Space technology; Wireless sensor networks; Access Control; Disclosing Degree; Information Imperfection; Pervasive Computing; Privacy protection;
         
        
        
        
            Conference_Titel : 
Pervasive Computing and Applications, 2008. ICPCA 2008. Third International Conference on
         
        
            Conference_Location : 
Alexandria
         
        
            Print_ISBN : 
978-1-4244-2020-9
         
        
            Electronic_ISBN : 
978-1-4244-2021-6
         
        
        
            DOI : 
10.1109/ICPCA.2008.4783571