User preference management in a pervasive system should be a trusted function

Sarah McBurney, Elizabeth Papadopoulou, Nick Taylor, Howard Williams

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In developing a ubiquitous or pervasive system, the privacy of the user needs to be protected as much as possible. At the same time the system needs to take account of the user's wishes in taking decisions on behalf of the user by maintaining a set of user preferences for each user. This involves not only the management of such preferences but also monitoring the user and automatic learning of new preferences or updates to existing ones. The need for privacy may lead to a crucial decision in the design of a pervasive system as to whether or not to treat the components dealing with personalization and user preference management as trusted components. This paper discusses four of the problems that arise if these components are not treated as trusted. Two of these are dealt with relatively easily although the remaining two are more challenging. Overall, the paper demonstrates why it is important to have an integrated system in which this functionality is trusted.

Original languageEnglish
Title of host publicationProceedings of the IASTED International Conference on Advances in Computer Science and Engineering, ACSE 2009
Pages77-82
Number of pages6
Publication statusPublished - 2009
EventIASTED International Conference on Advances in Computer Science and Engineering - Phuket, Thailand
Duration: 16 Mar 200918 Mar 2009

Conference

ConferenceIASTED International Conference on Advances in Computer Science and Engineering
Abbreviated titleACSE 2009
Country/TerritoryThailand
CityPhuket
Period16/03/0918/03/09

Keywords

  • Pervasive
  • Privacy
  • Trusted
  • User preferences

Fingerprint

Dive into the research topics of 'User preference management in a pervasive system should be a trusted function'. Together they form a unique fingerprint.

Cite this