Skip to main content

Privacy Policy Enforcement for Ambient Ubiquitous Services

  • Conference paper
Ambient Intelligence (AmI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6439))

Included in the following conference series:

  • 1615 Accesses

Abstract

Ubiquitous service providers leverage miniaturised computing terminals equipped with wireless capabilities to avail new service models. These models are pivoted on personal and inexpensive terminals to customise services to individual preferences. Portability, small sizes and compact keyboards are few features popularising mobile terminals. Features enable storing and carrying of ever increasing proportions of personal data and ability to use them in service adaptations. Ubiquitous services automate deeper soliciting of personal data transparently without the need for user interactions. Transparent solicitations, acquisitions and handling of personal data legitimises privacy concerns regarding disclosures, retention and re-use of the data. This study presents a policy enforcement for ubiquitous services that safeguards handling of users personal data and monitors adherence to stipulated privacy policies. Enforcement structures towards usability and scalability are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moores, T.T., Dhillon, G.: Do privacy seals in e-commerce really work? ACM Commun. 46(12), 265–271 (2003), http://doi.acm.org/10.1145/953460.953510

    Article  Google Scholar 

  2. Moores, T.: Do consumers understand the role of privacy seals in e-commerce? ACM Commun., 86–91 (2005), http://doi.acm.org/10.1145/1047671.1047674

  3. Kim, D.J., Steinfield, C., Lai, Y.-j.: Revisiting the role of web assurance seals in consumer trust. In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, pp. 280–287. ACM, New York (2004), http://doi.acm.org/10.1145/1052220.1052256

    Google Scholar 

  4. LaRose, R., Rifon, N.: Your privacy is assured-of being invaded. Web sites with and without privacy seals (March 2003), https://www.msu.edu/~larose/es2003post.htm (accessed February 4, 2010)

  5. The World Wide Web Consortium, Preferences 1.0 (P3P1.0) Specification. W3C Recommendation. WC3 (2002), http://www.w3c.org/TR/

  6. Mbanaso, U.M., Cooper, G.S., Chadwick, D.W., Proctor, S.: Privacy Preserving Trust Authorization Framework Using XACML. In: WOWMOM 2006: Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 673–678. IEEE Computer Society, Washington (2006), http://dx.doi.org/10.1109/WOWMOM.2006.92

    Google Scholar 

  7. Saklikar, S., Saha, S.: Next steps for security assertion markup language (saml). In: Proceedings of the 2007 ACM Workshop on Secure Web Services, SWS 2007, Fairfax, Virginia, USA, pp. 52–65. ACM, New York (2007), http://doi.acm.org/10.1145/1314418.1314427

    Chapter  Google Scholar 

  8. Serjantov, A.: A fresh look at the generalised mix framework. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 17–29. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Brown, P.W.: Digital signatures: can they be accepted as legal signatures in EDI? In: CCS 1993: Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, United States, pp. 86–92. ACM, New York (1993), http://doi.acm.org/10.1145/168588.168598

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Oyomno, W., Jäppinen, P., Kerttula, E. (2010). Privacy Policy Enforcement for Ambient Ubiquitous Services. In: de Ruyter, B., et al. Ambient Intelligence. AmI 2010. Lecture Notes in Computer Science, vol 6439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16917-5_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16917-5_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16916-8

  • Online ISBN: 978-3-642-16917-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics