The Jini architecture for network-centric computing
Communications of the ACM
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
A survey of research on context-aware homes
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Designing for Ubiquity: The Perception of Privacy
IEEE Pervasive Computing
Anonymity and certification: e-mail, a case study
Proceedings of the 2004 ACM symposium on Applied computing
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
People-to-People-to-Geographical-Places: The P3 Framework for Location-Based Community Systems
Computer Supported Cooperative Work
A fuzzy reasoning scheme for context sharing decision making
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Facilitating secure ad hoc service discovery in public environments
Journal of Systems and Software - Special issue: Computer software & applications
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Consistent Modelling of Users, Devices and Sensors in a Ubiquitous Computing Environment
User Modeling and User-Adapted Interaction
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Protecting privacy and anonymity in pervasive computing: trends and perspectives
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
Factors on the sense of privacy in video surveillance
Proceedings of the 3rd ACM workshop on Continuous archival and retrival of personal experences
Exploring the space of near-future design with children
Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles
Privacy-Aware Autonomous Agents for Pervasive Healthcare
IEEE Intelligent Systems
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
A system for locating mobile terminals with tunable privacy
Journal of Theoretical and Applied Electronic Commerce Research
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Privacy and community connectedness: designing intelligent environments for our cities
OZCHI '07 Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces
Between Extreme Rejection and Cautious Acceptance
Social Science Computer Review
Investigating Privacy Attitudes and Behavior in Relation to Personalization
Social Science Computer Review
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
MobiPass: a passport for mobile business
Personal and Ubiquitous Computing
Automatic identification of informal social groups and places for geo-social recommendations
International Journal of Mobile Network Design and Innovation
Adapting pervasive systems to multiuser privacy requirements
International Journal of Ad Hoc and Ubiquitous Computing
Understanding privacy regulation in ubicomp interactions
Personal and Ubiquitous Computing
APCHI '08 Proceedings of the 8th Asia-Pacific conference on Computer-Human Interaction
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Context-aware remote healthcare support system based on overlay network
WSEAS Transactions on Computers
Linking Privacy and User Preferences in the Identity Management for a Pervasive System
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
An adaptive context aware communication system for ubiquitous environment based on overlay network
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
Information Security and Cryptology --- ICISC 2008
A Formal Privacy Management Framework
Formal Aspects in Security and Trust
The Acceptance of Domestic Ambient Intelligence Appliances by Prospective Users
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
RFID and privacy: what consumers really want and fear
Personal and Ubiquitous Computing
Environment Objects: A Novel Approach for Modeling Privacy in Pervasive Computing
ICOST '09 Proceedings of the 7th International Conference on Smart Homes and Health Telematics: Ambient Assistive Health and Wellness Management in the Heart of the City
A hybrid positioning system for technology-independent location-aware computing
Software—Practice & Experience
Smart Privacy Management in Ubiquitous Computing Environments
Proceedings of the Symposium on Human Interface 2009 on Human Interface and the Management of Information. Information and Interaction. Part II: Held as part of HCI International 2009
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Location privacy protection through obfuscation-based techniques
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Privacy enhancing technologies for RFID in retail- an empirical investigation
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Dealing with anonymity in wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Enhancing privacy by applying information flow modelling in pervasive systems
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Managing pervasive environment privacy using the "fair trade" metaphor
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Towards personal privacy control
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
A critical approach to privacy research in ubiquitous environments-issues and underlying assumptions
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Providing location privacy in pervasive computing through a hybrid mechanism
International Journal of Internet Technology and Secured Transactions
Privacy preserving through a memorizing algorithm in location-based services
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Toward secure and private service discovery anywhere anytime
Frontiers of Computer Science in China
Online anonymity protection in computer-mediated communication
IEEE Transactions on Information Forensics and Security
A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce
Decision Support Systems
A flexible privacy and trust based context-aware secure framework
ICOST'10 Proceedings of the Aging friendly technology for health and independence, and 8th international conference on Smart homes and health telematics
On-line privacy and consent: a dialogue, not a monologue
Proceedings of the 2010 workshop on New security paradigms
Privacy management and control in ATRACO
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
ProQuPri: towards anonymity protection with privacy quantification for context-aware applications
Proceedings of the 2011 ACM Symposium on Applied Computing
Designing trustworthy adaptation on public displays
UMAP'11 Proceedings of the 19th international conference on User modeling, adaption, and personalization
Evaluating user-centered privacy model (UPM) in pervasive computing systems
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks
Journal of Systems and Software
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
Proceedings of the Seventh Symposium on Usable Privacy and Security
An effective method for location privacy in ubiquitous computing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Seamlessness and privacy enhanced ubiquitous payment
EC-Web'06 Proceedings of the 7th international conference on E-Commerce and Web Technologies
A generic privacy enhancing technology for pervasive computing environments
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Assessment of assistive technologies based on the PSA-BI model
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
Access controls for privacy protection in pervasive environments
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
Scanning with a purpose: supporting the fair information principles in RFID protocols
UCS'04 Proceedings of the Second international conference on Ubiquitous Computing Systems
AI'04 Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence
Incorporating privacy policy into an anonymity-based privacy-preserving ID-Based service platform
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
A user-centric privacy framework for pervasive environments
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
A legal ontology to support privacy preservation in location-based services
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Secure identity management for pseudo-anonymous service access
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
A spatiotemporal model of strategies and counter strategies for location privacy protection
GIScience'06 Proceedings of the 4th international conference on Geographic Information Science
Shadow: a middleware in pervasive computing environment for user controllable privacy protection
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Friend or foe? relationship-based adaptation on public displays
AmI'11 Proceedings of the Second international conference on Ambient Intelligence
Sensor tricorder: what does that sensor know about me?
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Methods for privacy protection considering status of service provider and user community
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
Investigating receptiveness to sensing and inference in the home using sensor proxies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Democratizing ubiquitous computing: a right for locality
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Privacy context model for dynamic privacy adaptation in ubiquitous computing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
ACM Transactions on Interactive Intelligent Systems (TiiS) - Special issue on highlights of the decade in interactive intelligent systems
Middleware for location privacy: an overview
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
International Journal of Mobile Computing and Multimedia Communications
Engineering adaptive privacy: on the role of privacy awareness requirements
Proceedings of the 2013 International Conference on Software Engineering
Hi-index | 0.00 |
Protecting personal privacy is going to be a prime concern for the deployment of ubiquitous computing systems in the real world. With daunting Orwellian visions looming, it is easy to conclude that tamper-proof technical protection mechanisms such as strong anonymization and encryption are the only solutions to such privacy threats. However, we argue that such perfect protection for personal information will hardly be achievable, and propose instead to build systems that help others respect our personal privacy, enable us to be aware of our own privacy, and to rely on social and legal norms to protect us from the few wrongdoers. We introduce a privacy awareness system targeted at ubiquitous computing environments that allows data collectors to both announce and implement data usage policies, as well as providing data subjects with technical means to keep track of their personal information as it is stored, used, and possibly removed from the system. Even though such a system cannot guarantee our privacy, we believe that it can create a sense of accountability in a world of invisible services that we will be comfortable living in and interacting with.