By Topic

Information Assurance, Privacy, and Security in Ubiquitous Questionnaire

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Goto, Y. ; Dept. of Inf. & Comput. Sci., Saitama Univ., Saitama, Japan ; Jingde Cheng

Ubiquitous questionnaire is to provide users with e-questionnaire services anytime and anywhere such that one can use e-questionnaire servers without even thinking about them. An e-questionnaire server for ubiquitous questionnaire should provide guarantees to satisfy any user-specified requirement on information assurance, privacy, and security because some questionnaires may concern organization secrets as well as personal privacy, and some questionnaires such as e-voting or e-testing must impose restrictions on and provide assurance to respondents, voters, and/or testees. Until now, there is no detail requirement analysis for information assurance, privacy, and security in ubiquitous questionnaire. To implement an e-questionnaire server for ubiquitous questionnaire, this paper presents a requirement analysis for information assurance, privacy, and security in ubiquitous questionnaire. The paper identifies all participants and their information assets in ubiquitous questionnaire with a general purpose e-questionnaire server that can be used not only an e-questionnaire server but also an e-voting server and an e-testing server, gives a threat analysis of and a requirement analysis for information assurance, privacy, and security, and investigates technical issues for implementing facilities satisfied the requirements.

Published in:

Frontier of Computer Science and Technology, 2009. FCST '09. Fourth International Conference on

Date of Conference:

17-19 Dec. 2009