The active badge location system
ACM Transactions on Information Systems (TOIS)
Next century challenges: Nexus—an open global infrastructure for spatial-aware applications
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Managing Privacy: Information Technology and Corporate America
Managing Privacy: Information Technology and Corporate America
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
Proceedings of the First International Workshop on Information Hiding
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
A survey on context-aware systems
International Journal of Ad Hoc and Ubiquitous Computing
Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Protecting Moving Trajectories with Dummies
MDM '07 Proceedings of the 2007 International Conference on Mobile Data Management
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Locanyms: towards privacy-preserving location-based services
Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience
Hi-index | 0.00 |
As our world becomes more and more proliferated by sensors and mobile devices - often connected by wireless networks - there is the urging need to develop appropriate abstractions for application development and deployment. Those abstractions should shield applications from the physical properties of the devices thereby allowing applications to focus on information processing based on global conceptual views (of the world) in form of context models. For the benefit of the user many mobile devices and applications communicate with others to perform their tasks. Therefore, we see the need to give users some kind of control when and to which extend to allow applications to communicate with other (mobile) devices or applications. In particular, a user should be allowed to determine how much (s)he is willing to share personal (private)data with others when participating in such context aware infrastructures. That is, the user should have control over how much his/her personal data is accessed by or communicated to other systems if privacy is a concern to him/her. This paper will elaborate on the concern for privacy in location-aware systems by providing various examples that should highlight the complexity of such concerns. We show that privacy needs a well founded base for handling user requirements appropriately. Often, privacy is not a static property, but it is context sensitive thus increasing the overall complexity of managing privacy according to the user's expectations. Additionally, we argue that quality aspects in context model based systems should include and embed privacy protection and control mechanism as an integral part on all levels therefore increasing the usability of such systems from a user's point of view.