[Zurück]


Vorträge und Posterpräsentationen (mit Tagungsband-Eintrag):

A. Tjoa, Reza Rawassizadeh:
"Securing Shareable Life-logs";
Vortrag: The Second IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), Minneapolis, Minnesota, USA; 20.08.2010 - 22.08.2010; in: "2010 IEEE Second International Conference on Social Computing", R. Rawassizadeh (Hrg.); IEEE Computer Society, Los Alamitos, CA, USA (2010), ISBN: 978-0-7695-4211-9; S. 1105 - 1110.



Kurzfassung deutsch:
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In particular, life-log information requires higher security considerations since it may contains very sensitive information about the user such as biological information, location, communication logs, etc. In this paper, first we discuss the risks of sharing lifelog information in a social community. Then we will introduce a sharing model, which can eliminate the sharing capability of a life-log information object, based on the expiration time. Furthermore, general security approaches which might decrease security related risks for life-log systems will be described.

Kurzfassung englisch:
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In particular, life-log information requires higher security considerations since it may contains very sensitive information about the user such as biological information, location, communication logs, etc. In this paper, first we discuss the risks of sharing lifelog information in a social community. Then we will introduce a sharing model, which can eliminate the sharing capability of a life-log information object, based on the expiration time. Furthermore, general security approaches which might decrease security related risks for life-log systems will be described.

Schlagworte:
life-log, security, sharing, social network, forgetting


Elektronische Version der Publikation:
http://publik.tuwien.ac.at/files/PubDat_192440.pdf