Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar class
Active In SP

Posts: 5,361
Joined: Feb 2011
14-02-2011, 09:52 AM

presented by:
Waleed Wagealla, Sotirios Terzis and Colin English
The Smartlab research group
Department of Computer and Information Sciences

In context-aware systems, there is a high demand on providingprivacy solutions to users when they are interacting and exchanging personalinformation. Privacy in this context encompasses reasoning about trust andrisk involved in interactions between users. Trust, therefore, controls theamount of information that can be revealed, and risk analysis allows us toevaluate the expected benefit that would motivate users to participate in theseinteractions. In this paper, we propose a trust-based model for privacy controlin context-aware systems based on incorporating trust and risk. Through thisapproach, it is clear how to reason about trust and risk in designing andimplementing context-aware systems that provide mechanisms to protectusers’ privacy. Our approach also includes experiential learning mechanismsfrom past observations in reaching better decisions in future interactions. Theoutlined model in this paper serves as an attempt to solve the concerns ofprivacy control in context-aware systems. To validate this model, we arecurrently applying it on a context-aware system that tracks users’ location. Wehope to report on the performance evaluation and the experience ofimplementation in the near future.


Recent advances in networking, handheld computing and sensortechnologies have led to the emergence of context-aware systems. This newtechnology makes it possible to collect assorted contextual sensing information,such as computing context, user context, and physical context [1]. In this paper, anarrow definition of context information is used, referring only to locationinformation. In location-aware systems, sensors are usually allocated in variousplaces to facilitate the collection of users’ location information in as accurate amanner as possible. The sensed data is processed by the context information servers(CIS), and then disseminated to users on demand

full report

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Load Rebalancing for Distributed File Systems in Clouds seminar tips 3 1,805 13-04-2015, 05:21 PM
Last Post: shilpavpius
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,451 31-03-2015, 09:08 AM
Last Post: Guest
  wireless video service in cdma systems wikipedia jaseelati 0 385 13-01-2015, 04:29 PM
Last Post: jaseelati
  credit card fraud detection using hidden markov model project download jaseelati 0 298 10-01-2015, 01:34 PM
Last Post: jaseelati
  Privacy-Preserving Public Auditing for Secure Cloud Storage seminar ideas 4 1,327 13-09-2014, 02:35 PM
Last Post: Radhika.m
  Intelligent Navigation Systems (Download Full Seminar Report) Computer Science Clay 10 6,648 24-03-2014, 02:24 PM
Last Post: seminar project topic
  Embedded Systems : An Overview ( Download Full Seminar Report ) computer science crazy 5 5,320 03-11-2013, 04:04 PM
Last Post: Guest
  4g wireless systems seminar or presentation computer science crazy 39 38,704 03-10-2013, 12:11 PM
Last Post: Guest
  Fuzzy MLS: An Experiment on Quantified Risk– Adaptive Access Control seminar projects maker 0 364 30-09-2013, 04:23 PM
Last Post: seminar projects maker
  Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Net seminar projects maker 0 405 30-09-2013, 04:22 PM
Last Post: seminar projects maker