Privacy Preserving Based on Rough Set Theory in Authentication for Pervasive Computing
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    In the pervasive computing environment, the users have to provide certain authentication information to the services provider to get the services they need, but the authentication information often contains the privacy which the users do not want to be leaked. In order to protect this privacy, this paper proposed a privacy preserving policy based on rough set theory in authentication for pervasive computing: the users expand the authentication information to a rough set and then provide the rough set to the services provider, the services provider extracts the users’ true authentication information from the rough set according to the pervasive preserving policy and then authenticate the users’ service request. The privacy preserving policy makes use of the uncertainty of rough set and can effectively prevent the leakage of user’s privacy.

    Reference
    Related
    Cited by
Get Citation

张燕武,王国军,燕锋.普适计算认证过程基于粗糙集的隐私保护策略.计算机系统应用,2010,19(11):88-91

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:March 02,2010
  • Revised:March 26,2010
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063