Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Protecting Access to People Location Information

Identifieur interne : 002982 ( Main/Merge ); précédent : 002981; suivant : 002983

Protecting Access to People Location Information

Auteurs : Urs Hengartner [États-Unis] ; Peter Steenkiste [États-Unis]

Source :

RBID : ISTEX:FC17687CFA02FC2F7F89AF5E4F5CBFB41E06265C

Abstract

Abstract: Ubiquitous computing provides new types of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, and only authorized entities should be able to learn it. We present several challenges that arise for the specification and implementation of policies controlling access to location information. For example, there can be multiple sources of location information, policies need to be flexible, conflicts between policies might occur, and privacy issues need to be taken into account. Different environments handle these challenges in a different way. We discuss the challenges in the context of a hospital and a university environment. We show how our design of an access control mechanism for a system providing people location information addresses the challenges. Our mechanism can be deployed in different environments. We demonstrate feasibility of our design with an example implementation based on digital certificates.

Url:
DOI: 10.1007/978-3-540-39881-3_6

Links toward previous steps (curation, corpus...)


Links to Exploration step

ISTEX:FC17687CFA02FC2F7F89AF5E4F5CBFB41E06265C

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Protecting Access to People Location Information</title>
<author>
<name sortKey="Hengartner, Urs" sort="Hengartner, Urs" uniqKey="Hengartner U" first="Urs" last="Hengartner">Urs Hengartner</name>
</author>
<author>
<name sortKey="Steenkiste, Peter" sort="Steenkiste, Peter" uniqKey="Steenkiste P" first="Peter" last="Steenkiste">Peter Steenkiste</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:FC17687CFA02FC2F7F89AF5E4F5CBFB41E06265C</idno>
<date when="2004" year="2004">2004</date>
<idno type="doi">10.1007/978-3-540-39881-3_6</idno>
<idno type="url">https://api.istex.fr/document/FC17687CFA02FC2F7F89AF5E4F5CBFB41E06265C/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">005785</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">005785</idno>
<idno type="wicri:Area/Istex/Curation">005785</idno>
<idno type="wicri:Area/Istex/Checkpoint">001D29</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">001D29</idno>
<idno type="wicri:doubleKey">0302-9743:2004:Hengartner U:protecting:access:to</idno>
<idno type="wicri:Area/Main/Merge">002982</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Protecting Access to People Location Information</title>
<author>
<name sortKey="Hengartner, Urs" sort="Hengartner, Urs" uniqKey="Hengartner U" first="Urs" last="Hengartner">Urs Hengartner</name>
<affiliation></affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
<author>
<name sortKey="Steenkiste, Peter" sort="Steenkiste, Peter" uniqKey="Steenkiste P" first="Peter" last="Steenkiste">Peter Steenkiste</name>
<affiliation></affiliation>
<affiliation wicri:level="4">
<country>États-Unis</country>
<placeName>
<settlement type="city">Pittsburgh</settlement>
<region type="state">Pennsylvanie</region>
</placeName>
<orgName type="university">Université Carnegie-Mellon</orgName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2004</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">FC17687CFA02FC2F7F89AF5E4F5CBFB41E06265C</idno>
<idno type="DOI">10.1007/978-3-540-39881-3_6</idno>
<idno type="ChapterID">6</idno>
<idno type="ChapterID">Chap6</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Ubiquitous computing provides new types of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, and only authorized entities should be able to learn it. We present several challenges that arise for the specification and implementation of policies controlling access to location information. For example, there can be multiple sources of location information, policies need to be flexible, conflicts between policies might occur, and privacy issues need to be taken into account. Different environments handle these challenges in a different way. We discuss the challenges in the context of a hospital and a university environment. We show how our design of an access control mechanism for a system providing people location information addresses the challenges. Our mechanism can be deployed in different environments. We demonstrate feasibility of our design with an example implementation based on digital certificates.</div>
</front>
</TEI>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Main/Merge
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002982 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Merge/biblio.hfd -nk 002982 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Main
   |étape=   Merge
   |type=    RBID
   |clé=     ISTEX:FC17687CFA02FC2F7F89AF5E4F5CBFB41E06265C
   |texte=   Protecting Access to People Location Information
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024