Skip to main content

Controlling Who Tracks Me

  • Conference paper
Security Protocols (Security Protocols 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3957))

Included in the following conference series:

  • 410 Accesses

Abstract

Many Ubiquitous Computing applications require tags and sensors that track the daily activates of people and things. For example, tags might be placed on objects to allow a system to remind people of the object’s location. In another application, caretakers of the elderly may wish to monitor the daily activities of those under their care, in order to track decline in functioning and offer appropriate medical care. These forms of tracking, however, raise privacy concerns. A person does not want to be tracked by everybody, but rather only by those that are trusted and only during certain times. We present a method of building tags and tracking devices that ensure a person is tracked only by those that have been granted that right, and only during the times specified.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. BBCNews.co.uk Radio tags spark privacy worries (November 11, 2003)

    Google Scholar 

  2. Weiser, M.: The Computer for the Twenty-First Century. Scientific American, 94–10 (September 1991)

    Google Scholar 

  3. Forbes.com. Digitally Monitoring Mom (August 14, 2003)

    Google Scholar 

  4. Lamming, M., Bohm, D.: SPECs: Another approach to human context and activity sensing research, using tiny peer-to-peer wireless computers. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 192–199. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. BBC News.co.uk. New mobile message craze spreads (November 4, 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bohm, D., Lamming, M., Mayo, R.N., Morgan, J., Zhang, K. (2006). Controlling Who Tracks Me. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2004. Lecture Notes in Computer Science, vol 3957. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11861386_16

Download citation

  • DOI: https://doi.org/10.1007/11861386_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40925-0

  • Online ISBN: 978-3-540-40926-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics