Abstract
Many Ubiquitous Computing applications require tags and sensors that track the daily activates of people and things. For example, tags might be placed on objects to allow a system to remind people of the object’s location. In another application, caretakers of the elderly may wish to monitor the daily activities of those under their care, in order to track decline in functioning and offer appropriate medical care. These forms of tracking, however, raise privacy concerns. A person does not want to be tracked by everybody, but rather only by those that are trusted and only during certain times. We present a method of building tags and tracking devices that ensure a person is tracked only by those that have been granted that right, and only during the times specified.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
BBCNews.co.uk Radio tags spark privacy worries (November 11, 2003)
Weiser, M.: The Computer for the Twenty-First Century. Scientific American, 94–10 (September 1991)
Forbes.com. Digitally Monitoring Mom (August 14, 2003)
Lamming, M., Bohm, D.: SPECs: Another approach to human context and activity sensing research, using tiny peer-to-peer wireless computers. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 192–199. Springer, Heidelberg (2003)
BBC News.co.uk. New mobile message craze spreads (November 4, 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bohm, D., Lamming, M., Mayo, R.N., Morgan, J., Zhang, K. (2006). Controlling Who Tracks Me. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2004. Lecture Notes in Computer Science, vol 3957. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11861386_16
Download citation
DOI: https://doi.org/10.1007/11861386_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40925-0
Online ISBN: 978-3-540-40926-7
eBook Packages: Computer ScienceComputer Science (R0)