Skip to main content

Privacy Management and Control in ATRACO

  • Conference paper
Ambient Intelligence (AmI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6439))

Included in the following conference series:

Abstract

Privacy is a critical factor for the acceptance and success of next generation ambient intelligent environments. Those environments often act autonomously to support a user’s activity based on context information gathered from ubiquitous sensors. The autonomous nature and their accessibility to large amount of personal information raises several privacy issues for participants in such environments. Those issues need to be addressed by adequate privacy mechanisms. In this paper we present an overview of the ATRACO approach to provide privacy management and control in an ambient intelligent environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (EPAL 1.2). Tech. rep., W3C (2003), http://www.w3.org/Submission/2003/SUBM-EPAL-20031110/

  2. Beresford, A., Stajano, F.: Location privacy in pervasive computing. Pervasive Computing, IEEE 2(1), 46–55 (2003)

    Article  Google Scholar 

  3. Bhattacharya, J., Dass, R., Kapoor, V., Gupta, S.: Utilizing network features for privacy violation detection. In: Proc. of the 1st Intl. Conference on Communication System Software and Middleware, pp. 1–10 (2006)

    Google Scholar 

  4. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–90 (1981)

    Article  Google Scholar 

  5. Cranor, L., Dobbs, B., Egelman, S., Hogben, G., Humphrey, J., Langheinrich, M.: The platform for privacy preferences 1.1 (P3P1.1) specification. Tech. rep., W3C (2006), http://www.w3.org/TR/2006/NOTE-P3P11-20061113/

  6. Godik, S., Anderson, A., Parducci, B., Humenn, P., Vajjhala, S.: OASIS eXtensible access control 2 markup language (XACML) 3. Tech. rep., OASIS (2002)

    Google Scholar 

  7. Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proc. of the 2nd Intl. Conference on Mobile Systems, Applications, and Services, pp. 177–189. ACM, Boston (2004)

    Google Scholar 

  8. Jiang, X., Hong, J., Landay, J.: Approximate information flows: Socially-Based modeling of privacy in ubiquitous computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 176–193. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Kameas, A.D., Goumopoulos, C., Hagras, H., Callaghan, V., Heinroth, T., Weber, M.: An architecture that supports Task-Centered adaptation in intelligent environments. In: Advanced Intelligent Environments, Boston, USA. Lecture Notes in Electrical Engineering, pp. 41–66 (2009)

    Google Scholar 

  10. Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing 13(6), 391–399 (2008)

    Article  Google Scholar 

  11. Könings, B., Schaub, F., Kargl, F., Weber, M.: Towards territorial privacy in smart environments. In: Intelligent Information Privacy Management Symposium (Privacy 2010). Stanford University, USA (2010)

    Google Scholar 

  12. Langheinrich, M.: Privacy by design - principles of Privacy-Aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)

    Google Scholar 

  13. Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. Ni, Q., Bertino, E., Lobo, J., Calo, S.B.: Privacy-Aware Role-Based access control. Security & Privacy, IEEE 7(4), 35–43 (2009)

    Article  Google Scholar 

  15. ”Privacy” Definition: The Oxford English Dictionary, 2nd edn. Oxford University Press, USA (2005)

    Google Scholar 

  16. Warren, S., Brandeis, L.: Right to privacy. Harvard Law Review 4, 193–220 (1890)

    Article  Google Scholar 

  17. Weiser, M.: Some computer science issues in ubiquitous computing. Communications of the ACM 36(7), 75–84 (1993)

    Article  Google Scholar 

  18. Westin, A.F.: Privacy and freedom. Atheneum, NY (1967)

    Google Scholar 

  19. Wishart, R., Henricksen, K., Indulska, J.: Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 929–940. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Könings, B., Wiedersheim, B., Weber, M. (2010). Privacy Management and Control in ATRACO. In: de Ruyter, B., et al. Ambient Intelligence. AmI 2010. Lecture Notes in Computer Science, vol 6439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16917-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16917-5_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16916-8

  • Online ISBN: 978-3-642-16917-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics