The active badge location system
ACM Transactions on Information Systems (TOIS)
Providing location information in a ubiquitous computing environment (panel session)
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
The stick-e note architecture: extending the interface beyond the user
Proceedings of the 2nd international conference on Intelligent user interfaces
Limbo: a tuple space based platform for adaptive mobile applications
ICODP/ICDP '97 Proceedings of the IFIP/IEEE international conference on Open distributed processing and distributed platforms
Cyberguide: a mobile context-aware tour guide
Wireless Networks - Special issue: mobile computing and networking: selected papers from MobiCom '96
Multimedia information changes the whole privacy ballgame
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Optimistic security: a new access control paradigm
Proceedings of the 1999 workshop on New security paradigms
The origins of ubiquitous computing research at PARC in the late 1980s
IBM Systems Journal
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Cross-modal interaction using XWeb
UIST '00 Proceedings of the 13th annual ACM symposium on User interface software and technology
Database nation: the death of privacy in the 21st century
Database nation: the death of privacy in the 21st century
Casablanca: designing social communication devices for the home
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Challenge: recombinant computing and the speakeasy approach
Proceedings of the 8th annual international conference on Mobile computing and networking
Personal and Ubiquitous Computing
The Interactive Workspaces Project: Experiences with Ubiquitous Computing Rooms
IEEE Pervasive Computing
A Middleware Infrastructure for Active Spaces
IEEE Pervasive Computing
Pirates: proximity-triggered interaction in a multi-player game
CHI '01 Extended Abstracts on Human Factors in Computing Systems
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
The Family Intercom: Developing a Context-Aware Audio Communication System
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
The Family Intercom: Developing a Context-Aware Audio Communication System
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
GeoNotes: Social and Navigational Aspects of Location-Based Information Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Context-Aware Computing: A Test Case
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Perceptual Components for Context Aware Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
User needs for location-aware mobile services
Personal and Ubiquitous Computing
Context Aggregation and Dissemination in Ubiquitous Computing Systems
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Challenge: ubiquitous location-aware computing and the "place lab" initiative
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Human-Computer Interaction
Desituating action: digital representation of context
Human-Computer Interaction
Topiary: a tool for prototyping location-enhanced applications
Proceedings of the 17th annual ACM symposium on User interface software and technology
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
People-to-People-to-Geographical-Places: The P3 Framework for Location-Based Community Systems
Computer Supported Cooperative Work
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
SoftVis '05 Proceedings of the 2005 ACM symposium on Software visualization
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Proceedings of the 7th international conference on Human computer interaction with mobile devices & services
Bridging the gap between organizational and user perspectives of security in the clinical domain
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Social matching: A framework and research agenda
ACM Transactions on Computer-Human Interaction (TOCHI)
CPOL: high-performance policy evaluation
Proceedings of the 12th ACM conference on Computer and communications security
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
You are what you say: privacy risks of public mentions
SIGIR '06 Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Reasoning about obfuscated private information: who have lied and how to lie
Proceedings of the 5th ACM workshop on Privacy in electronic society
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Privacy-Aware Autonomous Agents for Pervasive Healthcare
IEEE Intelligent Systems
A survey of software infrastructures and frameworks for ubiquitous computing
Mobile Information Systems
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
SmokeScreen: flexible privacy controls for presence-sharing
Proceedings of the 5th international conference on Mobile systems, applications and services
Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Applications
IEEE Pervasive Computing
Precision: Privacy Enhanced Context-Aware Information Fusion in Ubiquitous Healthcare
SEPCASE '07 Proceedings of the 1st International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments
Seven privacy worries in ubiquitous social computing
Proceedings of the 3rd symposium on Usable privacy and security
Modeling context in mobile distributed systems with the UML
Journal of Visual Languages and Computing
Privacy and the access of information in a smart house environment
Proceedings of the 15th international conference on Multimedia
Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
Disappearing for a while - using white lies in pervasive computing
Proceedings of the 2007 ACM workshop on Privacy in electronic society
A privacy controller approach for privacy protection in web services
Proceedings of the 2007 ACM workshop on Secure web services
The embedded panopticon: visibility issues of remote diagnostics surveillance
Scandinavian Journal of Information Systems
Privacy and community connectedness: designing intelligent environments for our cities
OZCHI '07 Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces
Creating dynamic groups using context-awareness
Proceedings of the 6th international conference on Mobile and ubiquitous multimedia
MobiPass: a passport for mobile business
Personal and Ubiquitous Computing
Scalable middleware for context-aware ubiquitous computing
CEA'07 Proceedings of the 2007 annual Conference on International Conference on Computer Engineering and Applications
A resource and context model for mobile middleware
Personal and Ubiquitous Computing - Special Issue: Selected Papers of the ARCS06 Conference
Automatic identification of informal social groups and places for geo-social recommendations
International Journal of Mobile Network Design and Innovation
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
Domain-based context management for dynamic and evolutionary environments
Proceedings of the 4th on Middleware doctoral symposium
A Local Broker enabled MobiPass architecture for enhancing trusted interaction efficiency
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
Cascadia: A System for Specifying, Detecting, and Managing RFID Events
Proceedings of the 6th international conference on Mobile systems, applications, and services
A critical evaluation of location based services and their potential
Journal of Location Based Services
An application framework for mobile, context-aware trails
Pervasive and Mobile Computing
Dynamic privacy assessment in a smart house environment using multimodal sensing
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Challenges of Designing Privacy Enhanced Context-Aware Middleware for Assisted Healthcare
ICOST '08 Proceedings of the 6th international conference on Smart Homes and Health Telematics
Secure localised storage based on super-distributed RFID-tag infrastructures
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
Theorizing mobility in community networks
International Journal of Human-Computer Studies
Busy families' awareness needs
International Journal of Human-Computer Studies
Towards a service-oriented Middleware Enabling Context Awareness for Smart Environment
International Journal of Ad Hoc and Ubiquitous Computing
PCP: privacy-aware context profile towards context-aware application development
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
A privacy-preserving UBICOMP architecture
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
MobiSoC: a middleware for mobile social computing applications
Mobile Networks and Applications
`Aware of What?' A Formal Model of Awareness Systems That Extends the Focus-Nimbus Model
Engineering Interactive Systems
Contory: a middleware for the provisioning of context information on smart phones
Proceedings of the ACM/IFIP/USENIX 2006 International Conference on Middleware
An anonymous communication model for privacy-enhanced location based service using an echo agent
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Safety in discretionary access control for logic-based publish-subscribe systems
Proceedings of the 14th ACM symposium on Access control models and technologies
SEVA: Sensor-enhanced video annotation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Privacy in location-based services: a system architecture perspective
SIGSPATIAL Special
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
FRAP: a framework for pervasive games
Proceedings of the 1st ACM SIGCHI symposium on Engineering interactive computing systems
Capturing Social Networking Privacy Preferences
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Privacy-Aware Location Database Service for Granular Queries
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
Navigational path privacy protection: navigational path privacy protection
Proceedings of the 18th ACM conference on Information and knowledge management
Privacy-aware mobile services over road networks
Proceedings of the VLDB Endowment
Amelie: A Recombinant Computing Framework for Ambient Awareness
AmI '09 Proceedings of the European Conference on Ambient Intelligence
Fine-Grained Recommendation Systems for Service Attribute Exchange
ICSOC-ServiceWave '09 Proceedings of the 7th International Joint Conference on Service-Oriented Computing
A framework for the design of privacy preserving pervasive healthcare
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
A new scheme of LBS privacy protection
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A portable toolkit for supporting end-user personalization and control in context-aware applications
Multimedia Tools and Applications
The infrastructure problem in HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Managing disclosure of personal health information in smart home healthcare
UAHCI'07 Proceedings of the 4th international conference on Universal access in human-computer interaction: ambient interaction
Field deployment of IMBuddy: a study of privacy control and feedback mechanisms for contextual IM
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Expected information needs of parents for pervasive awareness systems
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
Enabling private continuous queries for revealed user locations
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
Providing location privacy in pervasive computing through a hybrid mechanism
International Journal of Internet Technology and Secured Transactions
Trust-based data disclosure in sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Hide and seek: location sharing practices with social media
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
Privacy issues for online personal photograph collections
Journal of Theoretical and Applied Electronic Commerce Research
Expectation aware in-network context processing
Proceedings of the 4th ACM International Workshop on Context-Awareness for Self-Managing Systems
Modeling people's place naming preferences in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Jano: specification and enforcement of location privacy in mobile and pervasive environments
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing
Personal data vaults: a locus of control for personal data streams
Proceedings of the 6th International COnference
Caché: caching location-enhanced content to improve user privacy
ACM SIGMOBILE Mobile Computing and Communications Review
Privacy management and control in ATRACO
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
Dynamic privacy management in pervasive sensor networks
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
Managing security and privacy in ubiquitous eHealth information interchange
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Query-aware location anonymization for road networks
Geoinformatica
Caché: caching location-enhanced content to improve user privacy
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Location Privacy: Privacy, Efficiency and Recourse through a Prohibitive Contract
Transactions on Data Privacy
Who's your best friend?: targeted privacy attacks In location-sharing social networks
Proceedings of the 13th international conference on Ubiquitous computing
Trajectory privacy in location-based services and data publication
ACM SIGKDD Explorations Newsletter
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
Improving users' consistency when recalling location sharing preferences
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part I
Cover locations: availing location-based services without revealing the location
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Review: A framework for awareness maintenance
Journal of Network and Computer Applications
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
Proceedings of the Seventh Symposium on Usable Privacy and Security
Contory: a middleware for the provisioning of context information on smart phones
Middleware'06 Proceedings of the 7th ACM/IFIP/USENIX international conference on Middleware
CUP 2.0: high-level modeling of context-sensitive interactive applications
MoDELS'06 Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems
Combined resource and context model for qos-aware mobile middleware
ARCS'06 Proceedings of the 19th international conference on Architecture of Computing Systems
wear-UCAM: a toolkit for mobile user interactions in smart environments
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Middleware for distributed context-aware systems
OTM'05 Proceedings of the 2005 Confederated international conference on On the Move to Meaningful Internet Systems - Volume >Part I
Context summarization and garbage collecting context
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A privacy-aware service protocol for ubiquitous computing environments
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Towards summarized representation of time series data in pervasive computing systems
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Supporting generalized context interactions
SEM'04 Proceedings of the 4th international conference on Software Engineering and Middleware
A user-centric privacy framework for pervasive environments
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Towards realizing global scalability in context-aware systems
LoCA'05 Proceedings of the First international conference on Location- and Context-Awareness
Context obfuscation for privacy via ontological descriptions
LoCA'05 Proceedings of the First international conference on Location- and Context-Awareness
Simulation of obfuscation and negotiation for location privacy
COSIT'05 Proceedings of the 2005 international conference on Spatial Information Theory
Some methods for privacy in RFID communication
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
An authorisation and privacy framework for context-aware networks
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
A spatiotemporal model of strategies and counter strategies for location privacy protection
GIScience'06 Proceedings of the 4th international conference on Geographic Information Science
Protecting privacy with the MPEG-21 IPMP framework
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Recruitment framework for participatory sensing data collections
Pervasive'10 Proceedings of the 8th international conference on Pervasive Computing
A privacy agent in context-aware ubiquitous computing environments
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Shadow: a middleware in pervasive computing environment for user controllable privacy protection
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Balancing smartness and privacy for the ambient intelligence
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
A spatial cloaking framework based on range search for nearest neighbor search
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Sensor tricorder: what does that sensor know about me?
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Towards usable interfaces for proof based access rights on mobile devices
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
ACM SIGAPP Applied Computing Review
Verifying location-based services with declassification enforcement
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
EnergyPULSE: tracking sustainable behavior in office environments
Proceedings of the 2nd International Conference on Energy-Efficient Computing and Networking
A context-aware scheme for privacy-preserving location-based services
Computer Networks: The International Journal of Computer and Telecommunications Networking
Methods for privacy protection considering status of service provider and user community
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
Big brother knows your friends: on privacy of social communities in pervasive networks
Pervasive'12 Proceedings of the 10th international conference on Pervasive Computing
Privacy context model for dynamic privacy adaptation in ubiquitous computing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Integrating multi-source user data to enhance privacy in social interaction
Proceedings of the 13th International Conference on Interacción Persona-Ordenador
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Enhancing optimistic access controls with usage control
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Middleware for location privacy: an overview
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Follow you follow me: using location tracking to mitigate multi-device privacy threats
Proceedings of the Workshop on Multi-device App Middleware
An approach to domain-based scalable context management architecture in pervasive environments
Personal and Ubiquitous Computing
End User Context Modeling in Ambient Assisted Living
International Journal of Advanced Pervasive and Ubiquitous Computing
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
International Journal of Information Security and Privacy
Radiator: context propagation based on delayed aggregation
Proceedings of the 2013 conference on Computer supported cooperative work
What a tangled web we weave: lying backfires in location-sharing social media
Proceedings of the 2013 conference on Computer supported cooperative work
A comparative study of location-sharing privacy preferences in the United States and China
Personal and Ubiquitous Computing
Narrowcasting in social media: effects and perceptions
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Context data management: an architectural framework for context-aware services
Service Oriented Computing and Applications
Social-Loc: improving indoor localization with social sensing
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems
Crowdsourcing privacy preferences in context-aware applications
Personal and Ubiquitous Computing
Hi-index | 0.01 |
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy. To address this problem, we present Confab, a toolkit for facilitating the development of privacy-sensitive ubiquitous computing applications. The requirements for Confab were gathered through an analysis of privacy needs for both end-users and application developers. Confab provides basic support for building ubiquitous computing applications, providing a framework as well as several customizable privacy mechanisms. Confab also comes with extensions for managing location privacy. Combined, these features allow application developers and end-users to support a spectrum of trust levels and privacy needs.