The active badge location system
ACM Transactions on Information Systems (TOIS)
Exploiting space and location as a design framework for interactive mobile systems
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on human-computer interaction with mobile systems
Understanding and Using Context
Personal and Ubiquitous Computing
The Dark Side of Pervasive Computing
IEEE Pervasive Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
A Policy Language for a Pervasive Computing Environment
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Easing the Smart Home: Translating Human Hierarchies to Intelligent Environments
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part I: Bio-Inspired Systems: Computational and Ambient Intelligence
Inferring ECA-based rules for ambient intelligence using evolutionary feature extraction
Journal of Ambient Intelligence and Smart Environments
Hi-index | 0.00 |
This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. This implies a risk to privacy that might not be assumed if a clear and trustable privacy management model is not provided. However, since this kind of environments posses a set of highly heterogeneous sensing techniques, even basic privacy policies require a great management effort. Therefore, there is a tradeoff between providing automatic privacy configuration mechanisms and granting trustable privacy management models. Following the "fair-trade" metaphor, this paper presents a privacy solution dealing with user's privacy as a tradable good for obtaining environment's services. Thus, users gain access to more valuable services as they share more personal information. This strategy, combined with optimistic access control and logging mechanisms, enhances users' confidence in the system while encouraging them to share their information.