Architectural considerations for scalable, secure, mobile computing with location information
- 17 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
To take full advantage of the promise of mobile/ubiquitous computing requires the availability and use of location information about the various physical objects and persons in an environment. At the same time, indiscriminant use of location information for people can result in an invasion of privacy and provides the potential for abuse by third parties. In this article we describe a suite of useful location-based applications and discuss architectural considerations for supporting them in a scalable, secure fashion.Keywords
This publication has 7 references indexed in Scilit:
- The computer for the 21st CenturyIEEE Pervasive Computing, 2002
- Providing location information in a ubiquitous computing environment (panel session)ACM SIGOPS Operating Systems Review, 1993
- The active badge location systemACM Transactions on Information Systems, 1992
- Active badges and personal interactive computing objectsIEEE Transactions on Consumer Electronics, 1992
- An introduction to contemporary cryptologyProceedings of the IEEE, 1988
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978