Please wait a minute...
Computer & Telecommunication  2017, Vol. 1 Issue (5): 38-40    DOI:
Current Issue | Archive | Adv Search |
Research on Scenario Privacy Protection Design for Mobile Terminal
Zhang Shuai1,Zhao Yan2
HuBeiWater Resources Technical College Suqian Economic and Trade Occupation School
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Context-based personalized service has been widely used in people's daily life, and in the continuous expansion of the scope of service applications. However, behind these personalized service experiences, there are hidden privacy issues that cannot be ignored. Therefore, the study of the protection of situational privacy is an urgent need to achieve. This paper analyzes the privacy model of privacy protection in mobile context, breaks through the narrow concept of current situation privacy protection, improves the theoretical basis of situational privacy protection, puts forward the new protection method of situational privacy, and tries to solve the theoretical basis of current situation privacy protection imperfect status quo, to promote the development of cryptography, network security and software security technology and the practical application of situational privacy protection methods.
Key wordsmobile terminal      scenario privacy      privacy model      number of scenes      privacy protection     
Published: 15 November 2017
:  TP309  

Cite this article:

Zhang Shuai, Zhao Yan. Research on Scenario Privacy Protection Design for Mobile Terminal. Computer & Telecommunication, 2017, 1(5): 38-40.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2017/V1/I5/38

[1] TONG Wei HUANG Qi-ping.
Optimization Strategy of Privacy-oriented BRNN Protection
[J]. 电脑与电信, 2021, 1(12): 58-61.
[2] Peng Li-xun Liu Feng-kai. Resource RecommendationAlgorithm Based on K-anonymity for Generalizing User Query Requests[J]. 电脑与电信, 2020, 1(6): 66-73.
[3] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
[4] WANG Shuai ZHANG Gui-jie. AMeasure of Trajectory Similarity Based on a Negative Correlation with Distance[J]. 电脑与电信, 2020, 1(11): 60-64.
[5] ZUO Wen-tao LUO Guo-qiang. Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+"[J]. 电脑与电信, 2019, 1(3): 39-41.
[6] ZHANG Ling-zhi. Research on Mobile Terminal Software Development Based on Java[J]. 电脑与电信, 2018, 1(3): 73-75.
[7] Zhao Junjie. Research on the Protection of Consumers' Privacy in Electronic Commerce[J]. 电脑与电信, 2016, 1(5): 33-35.
[8] Hu Liping, Hu Shengyong. Design and Implementation of Digital Registration System[J]. 电脑与电信, 2016, 1(10): 70-72.
[9] Chen Rong. Study on the SSL VPN Network Security Technology[J]. 电脑与电信, 2015, 1(10): 50-51.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd