JFlow: practical mostly-static information flow control
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Engineering authority and trust in cyberspace: the OM-AM and RBAC way
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Murky conceptual waters: The public and the private
Ethics and Information Technology
Integrating Information Appliances into an Interactive Workspace
IEEE Computer Graphics and Applications
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Ubiquitous Healthcare: The OnkoNet Mobile Agents Architecture
Mobile Computing in Medicine, Second Conference on Mobile Computing in Medicine, Workshop of the Project Group MoCoMed, GMDS-Fachbereich Medizinische Informatik & GI-Fachausschuss 4.7
Changing places: contexts of awareness in computing
Human-Computer Interaction
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
Information exposure control through data manipulation for ubiquitous computing
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Protecting privacy and anonymity in pervasive computing: trends and perspectives
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
Privacy-Aware Autonomous Agents for Pervasive Healthcare
IEEE Intelligent Systems
Access control to information in pervasive computing environments
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Context-aware systems: A literature review and classification
Expert Systems with Applications: An International Journal
Privacy-Aware Web Services in Smart Homes
ICOST '09 Proceedings of the 7th International Conference on Smart Homes and Health Telematics: Ambient Assistive Health and Wellness Management in the Heart of the City
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Towards a security policy for ubiquitous healthcare systems
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Spatial security policies for mobile agents in a sentient computing environment
FASE'03 Proceedings of the 6th international conference on Fundamental approaches to software engineering
Mobile phone-to-phone personal context sharing
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce
Decision Support Systems
SBNMA '11 Proceedings of the 2011 ACM workshop on Social and behavioural networked media access
Open middleware-based infrastructure for context-aware in pervasive computing
CIS'04 Proceedings of the First international conference on Computational and Information Science
A generic privacy enhancing technology for pervasive computing environments
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
AI'04 Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence
Incorporating privacy policy into an anonymity-based privacy-preserving ID-Based service platform
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Secure identity management for pseudo-anonymous service access
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Privacy context model for dynamic privacy adaptation in ubiquitous computing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Hi-index | 0.00 |
From a system design standpoint, privacy control in context-aware systems faces significant challenges. Grouping is an important technique that defines the boundaries for which you can express and enforce permissions. A context-aware system realizes boundaries by providing useful abstractions that distinguish objects and actions along the boundaries that have meaningful privacy implications for the user. In this article, we describe a theoretical model for privacy control in context-aware systems based on a core abstraction of information spaces. We also discuss how we can introduce decentralization, a desirable property for many pervasive computing systems, into our information space model using unified privacy tagging.