An architecture for privacy-sensitive ubiquitous computing

@inproceedings{Hong2004AnAF,
  title={An architecture for privacy-sensitive ubiquitous computing},
  author={Jason I. Hong and James A. Landay},
  booktitle={MobiSys '04},
  year={2004}
}
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy. To address this problem, we present Confab, a toolkit for facilitating the development of privacy-sensitive ubiquitous computing applications. The requirements for Confab were gathered through an… Expand
Privacy in context: Privacy issues in Ubiquitous Computing applications
  • C. O'Driscoll
  • Computer Science
  • 2008 Third International Conference on Digital Information Management
  • 2008
TLDR
A review of privacy issues and guidelines for developing and assessing privacy-sensitive ubiquitous computing applications and a survey of principles and design guidelines has been completed and these are used in the assessment of a context aware smart classroom environment. Expand
Models for Privacy in Ubiquitous Computing Environments
TLDR
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed systems such as ubiquitous computing environments by presenting models for privacy of a user's communication, unlink-ability of a users' accesses, and authorized policy feedback that is both useful and privacy preserving. Expand
A Privacy-Aware Service Protocol for Ubiquitous Computing Environments
TLDR
A new privacy-aware service protocol is proposed that decouples the relation between a user’s identity and location and uses anonymous communication channel to hide the user's service consume pattern. Expand
A scheme for quantizing privacy in context-aware ubiquitous computing
TLDR
This paper aims to make perception of privacy intuitive for the user, yet allowing the scheme to be adept in resolving context, by introducing granularity of user privacy in context-aware systems deployed in ubiquitous computing environments. Expand
Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments
TLDR
An architecture that allows for balancing between privacy and traceability in ubiquitous computing environments is presented and its foundations and components are described and illustrated. Expand
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
TLDR
The Platform for Privacy Preferences of W3C is extended and a specification for representing user privacy preferences for context-aware applications is defined and a privacy infrastructure is proposed which enables the middleware to automatically generate a privacy policy and the user preference file according to the current context. Expand
A Privacy Service for Context-aware Mobile Computing
TLDR
CoPS is an optional service of the context-provisioning middleware MoCA and allows users of context- and location-aware applications to define and manage their privacy policies regarding disclosure of their context information. Expand
Privacy in Pervasive Computing and Open Issues
TLDR
This paper discusses how privacy might be preserved in a pervasive computing environment and presents some research developments in these areas to address privacy concerns. Expand
Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications
TLDR
This paper proposes to represent the available context information in each domain as a feature model, so that the developers are able to configure this feature model to get the context information they need, and the users can easily specify the context features they are willing to share. Expand
Towards the Modeling of Personal Privacy in Ubiquitous Computing Environments
TLDR
This work seeks to propose, verify, and analyze a formal model of privacy for these environments, namely the resources that need to be protected, the guidelines for constructing the model, and the high-level components of the personal privacy model. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 176 REFERENCES
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
TLDR
This paper proposes privacy risk models as a general method for refining privacy from an abstract concept into concrete issues for specific applications and prioritizing those issues. Expand
A Privacy Awareness System for Ubiquitous Computing Environments
TLDR
This work introduces a privacy awareness system targeted at ubiquitous computing environments that allows data collectors to both announce and implement data usage policies, as well as providing data subjects with technical means to keep track of their personal information as it is stored, used, and possibly removed from the system. Expand
Design for Privacy in Ubiquitous Computing Environments
TLDR
A framework for design for privacy in ubiquitous computing environments is described and an example of its application is described, with a description of how the technology attenuates natural mechanisms of feedback and control over information released. Expand
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
TLDR
Six principles for guiding system design are developed, based on a set of fair information practices common in most privacy legislation in use today: notice, choice and consent, proximity and locality, anonymity and pseudonymity, security, and access and recourse. Expand
Enabling context-aware and privacy-conscious user data sharing
  • R. Hull, B. Kumar, +4 authors A. Vyas
  • Computer Science
  • IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004
  • 2004
TLDR
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, namely the framework to support self-provisioning of preferences, and the performance of the underlying rules engine. Expand
Privacy and Security in the Location-enhanced World Wide Web
Privacy concerns remain a major barrier to adoption of location-based services. Users demand significant, concrete benefits before they are willing to allow an outside party to track their movements.Expand
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
TLDR
A framework for supporting sociallycompatible privacy objectives in ubiquitous computing settings is proposed and a key objective called the Principle of Minimum Asymmetry, which seeks to minimize the imbalance between the people about whom data is being collected and the systems and people that collect and use that data is developed. Expand
Towards Meeting the Privacy Challenge: Adapting DRM
TLDR
This paper outlines the legal requirements for privacy under the European Union Data Directive, and describes adaptations for transforming a DRM system into a privacy rights management system. Expand
Privacy Interfaces for Collaboration
Privacy is a hot topic today in the worlds of technology, ecommerce, and public policy. However, the vast majority of the public debate about privacy has pitted the consumer against corporations andExpand
Providing location information in a ubiquitous computing environment (panel session)
TLDR
This architecture gives users primary control over their location information, at the cost of making more expensive certain queries, such as those wherein location and identity closely interact. Expand
...
1
2
3
4
5
...