Abstract
Privacy is a critical factor for the acceptance and success of next generation ambient intelligent environments. Those environments often act autonomously to support a user’s activity based on context information gathered from ubiquitous sensors. The autonomous nature and their accessibility to large amount of personal information raises several privacy issues for participants in such environments. Those issues need to be addressed by adequate privacy mechanisms. In this paper we present an overview of the ATRACO approach to provide privacy management and control in an ambient intelligent environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (EPAL 1.2). Tech. rep., W3C (2003), http://www.w3.org/Submission/2003/SUBM-EPAL-20031110/
Beresford, A., Stajano, F.: Location privacy in pervasive computing. Pervasive Computing, IEEE 2(1), 46–55 (2003)
Bhattacharya, J., Dass, R., Kapoor, V., Gupta, S.: Utilizing network features for privacy violation detection. In: Proc. of the 1st Intl. Conference on Communication System Software and Middleware, pp. 1–10 (2006)
Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–90 (1981)
Cranor, L., Dobbs, B., Egelman, S., Hogben, G., Humphrey, J., Langheinrich, M.: The platform for privacy preferences 1.1 (P3P1.1) specification. Tech. rep., W3C (2006), http://www.w3.org/TR/2006/NOTE-P3P11-20061113/
Godik, S., Anderson, A., Parducci, B., Humenn, P., Vajjhala, S.: OASIS eXtensible access control 2 markup language (XACML) 3. Tech. rep., OASIS (2002)
Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proc. of the 2nd Intl. Conference on Mobile Systems, Applications, and Services, pp. 177–189. ACM, Boston (2004)
Jiang, X., Hong, J., Landay, J.: Approximate information flows: Socially-Based modeling of privacy in ubiquitous computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 176–193. Springer, Heidelberg (2002)
Kameas, A.D., Goumopoulos, C., Hagras, H., Callaghan, V., Heinroth, T., Weber, M.: An architecture that supports Task-Centered adaptation in intelligent environments. In: Advanced Intelligent Environments, Boston, USA. Lecture Notes in Electrical Engineering, pp. 41–66 (2009)
Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing 13(6), 391–399 (2008)
Könings, B., Schaub, F., Kargl, F., Weber, M.: Towards territorial privacy in smart environments. In: Intelligent Information Privacy Management Symposium (Privacy 2010). Stanford University, USA (2010)
Langheinrich, M.: Privacy by design - principles of Privacy-Aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)
Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)
Ni, Q., Bertino, E., Lobo, J., Calo, S.B.: Privacy-Aware Role-Based access control. Security & Privacy, IEEE 7(4), 35–43 (2009)
”Privacy” Definition: The Oxford English Dictionary, 2nd edn. Oxford University Press, USA (2005)
Warren, S., Brandeis, L.: Right to privacy. Harvard Law Review 4, 193–220 (1890)
Weiser, M.: Some computer science issues in ubiquitous computing. Communications of the ACM 36(7), 75–84 (1993)
Westin, A.F.: Privacy and freedom. Atheneum, NY (1967)
Wishart, R., Henricksen, K., Indulska, J.: Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 929–940. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Könings, B., Wiedersheim, B., Weber, M. (2010). Privacy Management and Control in ATRACO. In: de Ruyter, B., et al. Ambient Intelligence. AmI 2010. Lecture Notes in Computer Science, vol 6439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16917-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-16917-5_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16916-8
Online ISBN: 978-3-642-16917-5
eBook Packages: Computer ScienceComputer Science (R0)