Abstract
Privacy protection operation may block customized services in context aware systems. Adopting good privacy policies will be helpful to avoid such unfortunate situations, but traditional access control policies are not enough for this purpose. This paper proposes a privacy policy description mechanism for context-aware systems. It provides the facilities to describe abstraction on context data, in order to prevent invading user’s privacy, while keeping the context-aware serves continuing.
This research is supported by the Ubiquitous Autonomic Computing and Network Project, the Ministry of Information and Communication (MIC) 21st Century Frontier R&D Program in Korea.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cho, E.-S., Lee, K.-W.: Security Checks in Programming Languages for Ubiquitous Environments, Workshop on Pervasive Security, Privacy and Trust (August 2004)
Myers, A.C.: JFlow: Practical mostly-static information flow control. In: Symposium on Principles of Programming Languages (POPL), pp. 228–241 (January 1999)
McHugh, J., et al.: Lore: A database management system for semistructured data. SIGMOD Record 26(3) (September 1997)
Henricksen, K., Indulska, J., Rakotonirainy, A.: Modeling context information in pervasive computing systems. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol. 2414, p. 167. Springer, Heidelberg (2002)
Geographic Location/Privacy, http://www.ietf.org/html.charters/geopriv-charter.html
Gruteser, M., Grunwald, D.: Anonymous usage of Location-Based Services Through Spatial and Temporal Cloaking. In: 1st International Conference on Mobile Systems, Applications, and Services (May 2003)
Gandon, F.L., Sadeh, N.M.: A Semantic e-Wallet to Reconcile Privacy and Context Awareness. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 385–401. Springer, Heidelberg (2003)
Stallings: Cryptography and network security. Prentice Hall, Englewood Cliffs (1999)
Bertino, E., Ferrari, E.: Secure and selective dissemination of xml documents. ACM Trans. Inf. Syst. Secur. 5(3), 290–331 (2002)
Volz, R., et al.: Toward views in the Semantic Web. In: Proceedings of the 2nd International Workshop on Databases, Documents, and Information Fusion (DBFUSION 2002), July 4-5 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cho, ES., Lee, KW., Hong, M. (2005). Abstraction for Privacy in Context-Aware Environments. In: Magedanz, T., Karmouch, A., Pierre, S., Venieris, I. (eds) Mobility Aware Technologies and Applications. MATA 2005. Lecture Notes in Computer Science, vol 3744. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11569510_37
Download citation
DOI: https://doi.org/10.1007/11569510_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29410-8
Online ISBN: 978-3-540-32031-9
eBook Packages: Computer ScienceComputer Science (R0)