Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
The Gordian knot: political gridlock on the information highway
The Gordian knot: political gridlock on the information highway
Communications of the ACM
The platform for privacy preferences
Communications of the ACM
Anonymous Web transactions with Crowds
Communications of the ACM
Open letter to P3P developers & replies
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
ACM Transactions on Internet Technology (TOIT)
Privacy critics: UI components to safeguard users' privacy
CHI '99 Extended Abstracts on Human Factors in Computing Systems
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Web Privacy with P3p
Automated analysis of P3P-enabled Web sites
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
The intellectual challenge of CSCW: the gap between social requirements and technical feasibility
Human-Computer Interaction
Internet Privacy: Interpreting Key Issues
Information Resources Management Journal
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Proceedings of the 7th international conference on Human computer interaction with mobile devices & services
Bridging the gap between organizational and user perspectives of security in the clinical domain
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Privacy, identity and security in ambient intelligence: a scenario analysis
Telematics and Informatics
A privacy controller approach for privacy protection in web services
Proceedings of the 2007 ACM workshop on Secure web services
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Between Extreme Rejection and Cautious Acceptance
Social Science Computer Review
MobiPass: a passport for mobile business
Personal and Ubiquitous Computing
A privacy-preserving UBICOMP architecture
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Environment Objects: A Novel Approach for Modeling Privacy in Pervasive Computing
ICOST '09 Proceedings of the 7th International Conference on Smart Homes and Health Telematics: Ambient Assistive Health and Wellness Management in the Heart of the City
International Journal of Networking and Virtual Organisations
Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk
International Journal of Mobile Communications
Usability improvements for WLAN access
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction design and usability
A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce
Decision Support Systems
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Journal of Network and Computer Applications
Privacy assurance: bridging the gap between preference and practice
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Middleware for location privacy: an overview
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Two new economic models for privacy
ACM SIGMETRICS Performance Evaluation Review
Hi-index | 0.00 |
In pervasive environments, privacy is likely to be a major issue for users, and users will want to be notified of potential data capture. To provide notice to users, this paper argues for what it calls labeling protocols, technical mechanisms through which users can be informed of data requests and their consequences. Recent experiences with the Platform for Privacy Preferences Project (P3P), an attempt to provide privacy mechanisms for the Web, suggest important lessons for the design of a next generation labeling protocol that will be usable and useful in pervasive environments. This paper examines the P3P lessons and open issues with an eye to pervasive requirements.