Skip to main content

An Analysis of Social Guarantees for Context Based Applications

  • Conference paper
Bio-Science and Bio-Technology (BSBT 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 57))

Included in the following conference series:

  • 521 Accesses

Abstract

The biometric identification in context based applications is a promising research area but several legal aspect should be taken into account to develop context applications following legal assumptions as privacy, human rights, etc.. In this work, we present a guide of social guarantees to be developed in the context system for private relations (private user and private services) as for public relations (private/public users and public services). The proposal of this paper is center in a set of goals that should be accomplished by context applications to guarantee the privacy and the human rights.

This work was supported in part by Projects CICYT TIN2008-06742-C02-02/TSI, CICYT TEC2008-06732-C02-02/TEC, SINPROB, CAM MADRINET S-0505/TIC/0255 and DPS2008-07029-C02-02.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shilit, B.N.: A Context-Aware System Architecture for Mobile Distributed Computing. Ph.D.thesis, Dept of Computer Science, Columbia University (1995)

    Google Scholar 

  2. Dey, A.K., Saber, D., Abowd, G.D.: A conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications. Human-Computer Interaction (HCI) Journal 16, 97–166 (2001)

    Article  Google Scholar 

  3. Chen, Guanling, Kotz, David.: Context Aggregation and Dissemination in Ubiquitous Computing Systems. In: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications, June 20-21, 2002, p. 105 (2002)

    Google Scholar 

  4. Hong, J.: The context fabric: An infrastructure for context-aware computing. In: Minneapolis, A.P. (ed.) Extended Abstracts of ACM Conference on Human Factors in Computing Systems (CHI 2002), pp. 554–555. ACM Press, Minneapolis (2002)

    Chapter  Google Scholar 

  5. Sanchez-Pi, N., Fuentes, V., Carbo, J., Molina, J.: Knowledge-based system to define context in commercial applications. In: Proceedings of 8th International Conference on Software Engineering, Artificial Intelligence, Networking, and Paraallel/Distributed Computing (SNPD), Qingdao, China (2007)

    Google Scholar 

  6. Schmidt, A.: Interactive context-aware systems interacting with ambient intelligence. IOS Press, Amsterdam (2005)

    Google Scholar 

  7. Emiliani, P., Stephanidis, C.: Universal access to ambient intelligence environments: Opportunities and challenges for people with disabilities. IBM Systems Journal 44(3), 605–619 (2005)

    Article  Google Scholar 

  8. World population prospects: The 2006 revision and world urbanization prospects: The, revision. Technical report, Population Division of the Department of Economic and Social Affairs of the United Nations Secretariat (last access: Saturday, February 28, 2009; 12:01:46 AM)

    Google Scholar 

  9. Rentto, K., Korhonen, I., Vaatanen, A., Pekkarinen, L., Tuomisto, T., Cluitmans, L., Lappalainen, R.: Users’ preferences for ubiquitous computing applications at home. In: First European Symposium on Ambient Intelligence 2003, Veldhoven, The Netherlands (2003)

    Google Scholar 

  10. Becker, M., Werkman, E., Anastasopoulos, M., Kleinberger, T.: Approaching ambient intelligent home care system. In: Pervasive Health Conference and Workshops 2006, pp. 1–10 (2006)

    Google Scholar 

  11. Floeck, M., Litz, L.: Integration of home automation technology into an assisted living concept. Assisted Living Systems-Models, Architectures and Engineering Approaches (2007)

    Google Scholar 

  12. Fraile, J., Bajo, J., Corchado, J.: Amade: Developing a multi-agent architecture for home care environments. In: 7th Ibero-American Workshop in Multi-Agent Systems (2008)

    Google Scholar 

  13. Jain, A.K., Bolle, R.M., Pankanti, S.: Biometrics: Personal Identification in a Net-worked Society. Kluwer, Norwell (1999)

    Google Scholar 

  14. Daugman, J.: Biometric Decision Landscape,Technique Report No. TR482, University of Cambridge Computer Laboratory (1999)

    Google Scholar 

  15. That right is enshrined in Article 12 of Universal Declaration of Human Rights, Article 7 the Charter of Fundamental Rights of the European Union (2000/C 364/01) and implicity in Fourth Amendment

    Google Scholar 

  16. See. European Court of Human Rights, López Ostra v. Spain - 16798/90 [1994] ECHR 46 (9 December 1994). Katz v. United States, 389 U.S 347 (1967) Skinner v. Railway Labor Executives’ Ass’n, 489 U.S. 602 (1989). To see differences between legal systems: Kirtley: Is implementing the EU Data Protection Directive in the United States irreconcilable with the First Amendment? In: Government Information Quaterly, vol. 16(2), pp. 87–91 (2001)

    Google Scholar 

  17. Woodward, J.: Biometric scanning, law & policy: identifying the concerns-drafting the biometric blueprint. U. Pitt. L. Rev. 59, 97–155 (1998)

    Google Scholar 

  18. Beck, U.: La sociedad del riesgo: hacia una nueva modernidad (1998)

    Google Scholar 

  19. Lin, Liou, Wu: Opportunities and challenges created by terrorism. Technological Forecasting and Social Change 74(2), 148–164, 158 (2007)

    Google Scholar 

  20. Kennedy, G.: Thumbs up for biometric authentication. Computer Law Review & Tech. (8), 379–407 (2003-2004)

    Google Scholar 

  21. Parejo Alfonso, Luciano: Seguridad pública y policía administrativa de seguridad, Valencia (2008)

    Google Scholar 

  22. To see examples, http://www.biometrics.gov/Documents/FAQ.pdf (040809)

  23. That rights are enshrined in Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data OJ L 281, 23.11.1995, p. 31–50 and Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector OJ L 201, 31.7.2002, p. 37–47. In the United States doesn’t exist general regulation for data protection. Kuner, C: An international legal framework for data protection: issues and prospects. Computer Law & Security Review 25, 307–317 (2009)

    Google Scholar 

  24. Haas, E.: Back to the future? The use of biometrics, its impact on airport security, and how this technology should be governed. Journal of Air Law and Commerce (69), 459 (spring 2004)

    Google Scholar 

  25. Rodríguez de Santiago, J.Ma.: La ponderación de bienes e intereses en el Derecho Administrativo. Madrid (2000)

    Google Scholar 

  26. Kennedy. Note 20

    Google Scholar 

  27. This type of regulatory systems has been used previously in access points in the frontiers of the European Union, where a specific regulation exists: Council Regulation (EC) No 2252/2004 of 13 December 2004 on standards for security features and biometrics in passports and travel documents issued by Member States OJ L 385, 29.12.2004, p. 1–6 modified by Regulation (EC) No 444/2009 of the European Parliament and of the Council of 28 May 2009 amending Council Regulation (EC) No 2252/2004 on standards for security features and biometrics in passports and travel documents issued by Member States OJ L 142, 6.6.2009, pp. 1–4

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pedraza, J., Patricio, M.A., De Asís, A., Molina, J.M. (2009). An Analysis of Social Guarantees for Context Based Applications. In: Ślęzak, D., Arslan, T., Fang, WC., Song, X., Kim, Th. (eds) Bio-Science and Bio-Technology. BSBT 2009. Communications in Computer and Information Science, vol 57. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10616-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10616-3_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10615-6

  • Online ISBN: 978-3-642-10616-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics