Handling personalized redirection in a wireless pervasive computing system with different approaches to identity

Yuping Yang, Howard Williams, Nick Taylor, Sarah McBurney, Elizabeth Papadopoulou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

One important feature of a wireless pervasive computing system is to ensure that any incoming communication addressed to the user is dealt with according to the user's wishes - sent to an appropriate device, forwarded to another user, stored, etc. This is referred to as personalized redirection of communication. To do this it is necessary to maintain a profile of user preferences. However, in doing so, there is a natural risk to the security and privacy of the user. This paper considers two systems - one developed specifically to study personalized redirection and the other a wireless pervasive computing system which incorporates some of these ideas. Three different approaches to handling user identity that have been adopted in these two systems are described. The effects of these different approaches on personalization and the consequences for security and privacy in a wireless pervasive computing environment are discussed and compared. © 2006 IEEE.

Original languageEnglish
Title of host publication2006 1st International Symposium on Wireless Pervasive Computing
Pages441-446
Number of pages6
Volume2006
DOIs
Publication statusPublished - 2006
Event2006 1st International Symposium on Wireless Pervasive Computing - Phuket, Thailand
Duration: 16 Jan 200618 Jan 2006

Conference

Conference2006 1st International Symposium on Wireless Pervasive Computing
Country/TerritoryThailand
CityPhuket
Period16/01/0618/01/06

Keywords

  • Personalized
  • Pervasive
  • Privacy
  • Redirection

Fingerprint

Dive into the research topics of 'Handling personalized redirection in a wireless pervasive computing system with different approaches to identity'. Together they form a unique fingerprint.

Cite this