Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Engineering authority and trust in cyberspace: the OM-AM and RBAC way
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Threshold-based identity recovery for privacy enhanced applications
Proceedings of the 7th ACM conference on Computer and communications security
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Code and Other Laws of Cyberspace
Code and Other Laws of Cyberspace
Modeling Privacy Control in Context-Aware Systems
IEEE Pervasive Computing
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Wearable Computing Meets Ubiquitous Computing: Reaping the Best of Both Worlds
ISWC '99 Proceedings of the 3rd IEEE International Symposium on Wearable Computers
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Changing places: contexts of awareness in computing
Human-Computer Interaction
Desituating action: digital representation of context
Human-Computer Interaction
Modeling Privacy Control in Context-Aware Systems
IEEE Pervasive Computing
eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Information exposure control through data manipulation for ubiquitous computing
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy-Aware Autonomous Agents for Pervasive Healthcare
IEEE Intelligent Systems
Precision: Privacy Enhanced Context-Aware Information Fusion in Ubiquitous Healthcare
SEPCASE '07 Proceedings of the 1st International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Privacy and community connectedness: designing intelligent environments for our cities
OZCHI '07 Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces
Privacy in the Age of Transparency
Social Science Computer Review
Understanding privacy regulation in ubicomp interactions
Personal and Ubiquitous Computing
Special issue on privacy aware and location-based mobile services
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Busy families' awareness needs
International Journal of Human-Computer Studies
The watcher and the watched: social judgments about privacy in a public place
Human-Computer Interaction
A context-sensitive security model for privacy protection on mobile phones
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
Private whispers/public eyes: Is receiving highly personal information in a public place stressful?
Interacting with Computers
An empirical investigation of attitude towards location-aware social network service
International Journal of Mobile Communications
Amelie: A Recombinant Computing Framework for Ambient Awareness
AmI '09 Proceedings of the European Conference on Ambient Intelligence
A framework for the design of privacy preserving pervasive healthcare
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
An index-based privacy preserving service trigger in context-aware computing environments
Expert Systems with Applications: An International Journal
Expected information needs of parents for pervasive awareness systems
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
Understanding compliance to privacy guidelines using text-and video-based scenarios
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
A critical approach to privacy research in ubiquitous environments-issues and underlying assumptions
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Proceedings of the Sixth Symposium on Usable Privacy and Security
A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce
Decision Support Systems
Privacy management and control in ATRACO
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
Ambient intelligence: A survey
ACM Computing Surveys (CSUR)
Building infrastructure support for ubiquitous context-aware systems
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Development of a privacy addendum for open source licenses: value sensitive design in industry
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
TreasurePhone: context-sensitive user data protection on mobile phones
Pervasive'10 Proceedings of the 8th international conference on Pervasive Computing
Balancing smartness and privacy for the ambient intelligence
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Sequenced release of privacy-accurate information in a forensic investigation
Digital Investigation: The International Journal of Digital Forensics & Incident Response
International Journal of Human-Computer Studies
International Journal of Human-Computer Studies
Hi-index | 0.00 |
In this paper, we propose a framework for supporting sociallycompatible privacy objectives in ubiquitous computing settings. Drawing on social science research, we have developed a key objective called the Principle of Minimum Asymmetry, which seeks to minimize the imbalance between the people about whom data is being collected, and the systems and people that collect and use that data. We have also developed Approximate Information Flow (AIF), a model describing the interaction between the various actors and personal data. AIF effectively supports varying degrees of asymmetry for ubicomp systems, suggests new privacy protection mechanisms, and provides a foundation for inspecting privacy-friendliness of ubicomp systems.