The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Security Considerations for a Distributed LocationService
Journal of Network and Systems Management
A Catalyst for Mobile and Ubiquitous Computing
IEEE Pervasive Computing
Modeling Privacy Control in Context-Aware Systems
IEEE Pervasive Computing
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous
A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous
Building disappearing computers
Communications of the ACM - The disappearing computer
Privacy and trust issues with invisible computers
Communications of the ACM - The disappearing computer
Towards the development of privacy-aware systems
Information and Software Technology
Private whispers/public eyes: Is receiving highly personal information in a public place stressful?
Interacting with Computers
An index-based privacy preserving service trigger in context-aware computing environments
Expert Systems with Applications: An International Journal
An informed view on consent for UbiComp
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Hi-index | 0.00 |
Pervasive computing is expected to enter our everyday life in the foreseeable future. The capabilities of the devices, which operate in such an environment, as well as the range of services offered to the end-users are expected to be significantly increased. However, this new era is expected to have a serious effect on privacy. In this paper, we first refer to the privacy threats identified in a pervasive environment; then, we present a set of principles for ensuring privacy in this context. In the sequel, we examine a number of privacy protection mechanisms for pervasive systems, with a focus on the level of anonymity offered to the end-users. We identify flaws, these mechanisms suffer by, in terms of the limited anonymity level they offer. We conclude by presenting a set of essential actions one should take into account, in order to ensure user's anonymity in a pervasive computing environment.