ACM Transactions on Graphics (TOG)
Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Providing architectural support for building context-aware applications
Providing architectural support for building context-aware applications
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Reasoning about Uncertain Contexts in Pervasive Computing Environments
IEEE Pervasive Computing
Privacy protecting data collection in media spaces
Proceedings of the 12th annual ACM international conference on Multimedia
Privacy gradients: exploring ways to manage incidental information during co-located collaboration
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Developing privacy guidelines for social location disclosure applications and services
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Queue - HCI
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
A practical approach to recognizing physical activities
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Building reliable activity models using hierarchical shrinkage and mined ontology
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Time, ownership and awareness: the value of contextual locations in the home
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Privacy in Location-Aware Computing Environments
IEEE Pervasive Computing
The BikeNet mobile sensing system for cyclist experience mapping
Proceedings of the 5th international conference on Embedded networked sensor systems
Data-centric middleware for context-aware pervasive computing
Pervasive and Mobile Computing
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
MAX: Wide area human-centric search of the physical world
ACM Transactions on Sensor Networks (TOSN)
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
LoCA '09 Proceedings of the 4th International Symposium on Location and Context Awareness
BikeNet: A mobile sensing system for cyclist experience mapping
ACM Transactions on Sensor Networks (TOSN)
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Fast track article: Bubble-sensing: Binding sensing tasks to the physical world
Pervasive and Mobile Computing
Weightless walls and the future office
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
CenceMe: injecting sensing presence into social networking applications
EuroSSC'07 Proceedings of the 2nd European conference on Smart sensing and context
Secure information sharing between heterogeneous embedded devices
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Protecting location privacy against inference attacks
Proceedings of the 17th ACM conference on Computer and communications security
Protecting location privacy against inference attacks
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
MeD-Lights: a usable metaphor for patient controlled access to electronic health records
Proceedings of the 1st ACM International Health Informatics Symposium
Audience visualization influences disclosures in online social networks
CHI '11 Extended Abstracts on Human Factors in Computing Systems
SBNMA '11 Proceedings of the 2011 ACM workshop on Social and behavioural networked media access
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
Proceedings of the Seventh Symposium on Usable Privacy and Security
Journal of Network and Computer Applications
Middleware for location privacy: an overview
Proceedings of the 2012 ACM Research in Applied Computation Symposium
My privacy policy: exploring end-user specification of free-form location access rules
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Privacy analysis in mobile social networks: the influential factors for disclosure of personal data
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users' contextual information, leading to users unwittingly leaving "digital footprints." Users must thus be allowed to control how their digital footprints are reported to third parties. While a significant amount of prior work has focused on location privacy, location is only one type of footprint, and we expect most users to be incapable of specifying fine-grained policies for a multitude of footprints. In this paper we present a policy language based on the metaphor of physical walls, and posit that users will find this abstraction to be an intuitive way to control access to their digital footprints. For example, users understand the privacy implications of meeting in a room enclosed by physical walls. By allowing users to deploy "virtual walls," they can control the privacy of their digital footprints much in the same way they control their privacy in the physical world. We present a policy framework and model for virtual walls with three levels of transparency that correspond to intuitive levels of privacy, and the results of a user study that indicates that our model is easy to understand and use.