Abstract
During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Weiser M. The Computer for the 21st Century. Scientific American, 1991:256:3: 94–104.
Krikorian R. The Net Comes Home. New Scientist, February 2003.
Overby C S. The X Internet and Consumer Privacy. Forrester Report, December 2003.
Culler D et al. TinyOS: An Operating System for Sensor Networks. In: Rabaey J (editor). Ambient Intelligence. Springer, 2004.
Sarma S E et al. Radio-Frequency Identification: Security Risks and Challenges. RS A CryptoBytes, 2003:6.
Warren S and Brandeis L. The Right to Privacy. Harvard Law Review, December 1890:IV:5.
Westin A. Privacy and Freedom. Atheneum, New York, 1967.
Laurant C. Privacy and Human Rights: An International Survey of Privacy Laws and Developments. Electronic Privacy Information Center, Washington, DC, 2003.
Marx G. Murky Conceptual Waters: The Private and the Public. Ethics and Information Technology, July 2001.
Adams A. Multimedia Information Changes the Whole Privacy Ballgame. Proceedings of Computers, Freedom, and Privacy, 2000.
Lederer S. Everyday Privacy in Ubiquitous Computing Environments. Workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing, UbiComp, 2002.
Lessig L. The Architecture of Privacy. Taiwan Net Conference, 1998.
Acquisti A. Privacy and Security of Personal Information: Economic Incentives and Technological Solutions. In: Camp J and Lewis R (editors). The Economics of Information Security. Kluwer Academic Publishers, 2004.
OECD — Recommendation Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data. September 1980.
Greenleaf G. Australia’s APEC Privacy Initiative: The Pros and Cons of OECD Lite. Privacy Law and Policy Reporter, 2003.
OECD — Ministerial Declaration on the Protection of Privacy on Global Networks. October 1998.
Clarke R. Beyond the OECD Guidelines: Privacy Protection for the 21st Century. January 2000 — http://www.anu.edu.au/people/Roger.Clarke/DV/PP21C.html
Justice M K. Privacy Protection, A New Beginning: OECD Principles 20 Years on. Privacy Law and Policy Reporter, 1999.
EU Directive 1995/46/EC of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data. October 1995.
Pfitzmann A and Köhntopp M. Anonymity, Unobservability, and Pseudonymity — A Proposal for Terminology. Workshop on Design Issues in Anonymity and Unobservability, Berkeley, California, 2002.
Juels A. Privacy and Authentication in Low-Cost RFID Tags. RS A Laboratories, 2003.
Chaum D. Untraceable Electronic Mail: Return Addresses and Digital Pseudonyms. Communications of the ACM, 1981:24:2:84–90.
Reiter M K and Rubin A D. Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security, 1998.
EU Directive 2002/58/EC of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector. July 2002.
EU Directive 1997/66/EC of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Telecommunications Sector. December 1997.
Beresford A and Stajano F. Mix Zones: User Privacy in Location-aware Services. IEEE International Workshop on Pervasive Computing and Communication Security (PerSec) 2004.
Gruteser M and Grunwald D. Anonymous Usage of Location-based Services Through Spatial and Temporal Cloaking. ACM/USENIX International Conference on Mobile Systems, Applications and Services (MobiSys) 2003.
Brin D. The Transparent Society. Addison-Wesley, 1998.
Guerin D. Anarchism: From Theory to Practice. Monthly Review Press, 1970.
Federal Trade Commission. Workshop on the Information Marketplace: Merging and Exchanging Consumer Data. Washington DC, March 2001.
Fred H C. Principles for Protecting Privacy. The Cato Journal, March 2002.
Cranor L et al. The Platform for Privacy Preferences 1.0 (P3P 1.0) specification. W3C Recommendation, April 2002 — http://www.w3.org/TR/2002/REC-P3P-20020416
Pedersen A. P3P — Problems, Progress, Potential. Privacy Laws & Business International Newsletter, February 2003.
Thidadeau R. A Critique of P3P: Privacy on the Web. August 2000 — dollar, ecom. emu. edu/p3pcritique/
Birchman J A. Is P3P ‘The Devil’? Law and the Internet Seminars, University of Miami School of Law, May 1998 — http://www.law.miami.edu/~froomkin/sem97/ birchman.html
Langheinrich M. A Privacy Awareness System for Ubiquitous Computing Environments. 4th International Conference on Ubiquitous Computing (UbiComp) 2002.
Juels A and Brainard J. Soft Blocking: Flexible Blocker Tags on the Cheap. Manuscript 2003 — http.V/www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/softblocker/ softblocker.pdf
Casassa-Mont M, Pearson S, and Bramhill P. Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. IEEE 14th International Workshop on Database and Expert Systems Applications (DEXA’03) September 2003.
Boneh D and Franklin M. Identity-based Encryption from the Weil Pairing. Crypto, 2001.
Tygar D. Security with Privacy. ISAT 2002 study, December 2002.
Karjoth G, Schunter M, and Waidner M. Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data. 2nd Workshop on Privacy Enhancing Technologies, April 2002.
Cui W, Duan Y, and Wei K. Toward Trustworthy Ubiquitous Computing Environments. CS261 Class Project Report, Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, Fall 2002.
Ferraiolo D and Kuhn R. Role-based Access Control. 15th NIST-NCSC National Computer Security Conference, 1992.
Altenschmidt C, Biskup J, Flegel U, and Karabulut Y Secure Mediation: Requirements, Design and Architecture. Journal of Computer Security, 2003:11:3.
Goecks J and Mynatt E: Enabling Privacy Management in Ubiquitous Computing Environments through Trust and Reputation Systems. Computer Supported Cooperative Work (CSCS 2002 Workshop in Privacy in Digital Environments: Empowering Users), 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag London Limited
About this chapter
Cite this chapter
Soppera, A., Burbridge, T. (2006). Maintaining Privacy in Pervasive Computing — Enabling Acceptance of Sensor-based Services. In: Steventon, A., Wright, S. (eds) Intelligent Spaces. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84628-429-8_11
Download citation
DOI: https://doi.org/10.1007/978-1-84628-429-8_11
Publisher Name: Springer, London
Print ISBN: 978-1-84628-002-3
Online ISBN: 978-1-84628-429-8
eBook Packages: Computer ScienceComputer Science (R0)