Privacy-enhancing technologies for the Internet
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
Bilateral E-services Negotiation Under Uncertainty
SAINT '03 Proceedings of the 2003 Symposium on Applications and the Internet
Security and privacy issues of handheld and wearable wireless devices
Communications of the ACM - Why CS students need math
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Privacy Policy Compliance for Web Services
ICWS '04 Proceedings of the IEEE International Conference on Web Services
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
Using Privacy Policies to Protect Privacy in UBICOMP
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
Information exposure control through data manipulation for ubiquitous computing
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Hi-index | 0.00 |
With the increasing deployment of sensors, intelligent devices of all sizes, and wireless networking, ubiquitous computing (UBICOMP) environments are getting closer to reality. Research in UBICOMP has focused on enabling technologies, such as networking, data management, security, and user interfaces. However, privacy for UBICOMP has been a contentious issue and the privacy concerns that have been raised suggest that privacy may be the greatest barrier to the long-term success of UBICOMP. This paper proposes a hybrid (locally centralized but peer-to-peer across the Internet) UBICOMP architecture that respects personal privacy preferences expressed in the form of personal privacy policies.