An Architecture for Privacy-Sensitive Ubiquitous Computing

@inproceedings{Hong2004AnAF,
  title={An Architecture for Privacy-Sensitive Ubiquitous Computing},
  author={Jason I. Hong and James A. Landay},
  booktitle={MobiSys},
  year={2004}
}
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy. To address this problem, we present Confab, a toolkit for facilitating the development of privacy-sensitive ubiquitous computing applications. The requirements for Confab were gathered through an… CONTINUE READING
Highly Influential
This paper has highly influenced 42 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 589 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 356 extracted citations

The SITA principle for location privacy — Conceptual model and architecture

2013 International Conference on Privacy and Security in Mobile Systems (PRISMS) • 2013
View 5 Excerpts
Highly Influenced

Privacy in context: Privacy issues in Ubiquitous Computing applications

2008 Third International Conference on Digital Information Management • 2008
View 8 Excerpts
Highly Influenced

A privacy-preserving UBICOMP architecture

PST • 2006
View 4 Excerpts
Highly Influenced

590 Citations

050'03'06'10'14'18
Citations per Year
Semantic Scholar estimates that this publication has 590 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 18 references

An Architecture for Privacy-Sensitive Ubiquitous Computing

J. I. Hong, J. A. Landay
In The Second International Conference on Mobile Systems, Applications, and Services • 2004
View 4 Excerpts
Highly Influenced

Presenting choices in context: approaches to information sharing. 2003: Workshop on Ubicomp communities: Privacy as Boundary Negotiation

J. Grudin, E. Horvitz
2003
View 4 Excerpts
Highly Influenced

Privacy and Security in the Location-enhanced World Wide Web

Hong, J.I
In Fifth International Conference on Ubiquitous Computing: Ubicomp • 2003
View 19 Excerpts
Highly Influenced

The Platform for Privacy Preferences

Commun. ACM • 1999
View 5 Excerpts
Highly Influenced

Designing Disclosure: Interactive Personal Privacy at the Dawn of Ubiquitous Computing

S. Lederer
Unpublished Master of Science, • 2003
View 3 Excerpts
Highly Influenced

Dozens of nurses in Castro Valley balk at wearing locators

P. Reang
The Mercury News pp., • 2002
View 4 Excerpts
Highly Influenced

Towards Meeting the Privacy Challenge: Adapting DRM

Digital Rights Management Workshop • 2002
View 3 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…