E-P3P privacy policies and privacy authorization
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Proceedings of the 7th international conference on Human computer interaction with mobile devices & services
Hi-index | 0.00 |
Maintaining user privacy is a well-known challenge and obstacle to the acceptance of pervasive computing. Privacy has been researched from various perspectives by social science, legislative, and technological communities resulting in an information-centric approach that regulates of the collection and use of personal information. However, through the actuation of devices and objects in the user's physical environment, pervasive computing also introduces other significant challenges to a user's physical privacy. Our research introduces an environment-centric approach to modeling user privacy and regulating intrusions to physical privacy. We introduce four principles to guide the construction of physical privacy policies and demonstrate how existing information privacy models can be extended to address these aspects of physical privacy.