Abstract
Ubiquitous service providers leverage miniaturised computing terminals equipped with wireless capabilities to avail new service models. These models are pivoted on personal and inexpensive terminals to customise services to individual preferences. Portability, small sizes and compact keyboards are few features popularising mobile terminals. Features enable storing and carrying of ever increasing proportions of personal data and ability to use them in service adaptations. Ubiquitous services automate deeper soliciting of personal data transparently without the need for user interactions. Transparent solicitations, acquisitions and handling of personal data legitimises privacy concerns regarding disclosures, retention and re-use of the data. This study presents a policy enforcement for ubiquitous services that safeguards handling of users personal data and monitors adherence to stipulated privacy policies. Enforcement structures towards usability and scalability are presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Moores, T.T., Dhillon, G.: Do privacy seals in e-commerce really work? ACM Commun. 46(12), 265–271 (2003), http://doi.acm.org/10.1145/953460.953510
Moores, T.: Do consumers understand the role of privacy seals in e-commerce? ACM Commun., 86–91 (2005), http://doi.acm.org/10.1145/1047671.1047674
Kim, D.J., Steinfield, C., Lai, Y.-j.: Revisiting the role of web assurance seals in consumer trust. In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, pp. 280–287. ACM, New York (2004), http://doi.acm.org/10.1145/1052220.1052256
LaRose, R., Rifon, N.: Your privacy is assured-of being invaded. Web sites with and without privacy seals (March 2003), https://www.msu.edu/~larose/es2003post.htm (accessed February 4, 2010)
The World Wide Web Consortium, Preferences 1.0 (P3P1.0) Specification. W3C Recommendation. WC3 (2002), http://www.w3c.org/TR/
Mbanaso, U.M., Cooper, G.S., Chadwick, D.W., Proctor, S.: Privacy Preserving Trust Authorization Framework Using XACML. In: WOWMOM 2006: Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 673–678. IEEE Computer Society, Washington (2006), http://dx.doi.org/10.1109/WOWMOM.2006.92
Saklikar, S., Saha, S.: Next steps for security assertion markup language (saml). In: Proceedings of the 2007 ACM Workshop on Secure Web Services, SWS 2007, Fairfax, Virginia, USA, pp. 52–65. ACM, New York (2007), http://doi.acm.org/10.1145/1314418.1314427
Serjantov, A.: A fresh look at the generalised mix framework. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 17–29. Springer, Heidelberg (2007)
Brown, P.W.: Digital signatures: can they be accepted as legal signatures in EDI? In: CCS 1993: Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, United States, pp. 86–92. ACM, New York (1993), http://doi.acm.org/10.1145/168588.168598
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Oyomno, W., Jäppinen, P., Kerttula, E. (2010). Privacy Policy Enforcement for Ambient Ubiquitous Services. In: de Ruyter, B., et al. Ambient Intelligence. AmI 2010. Lecture Notes in Computer Science, vol 6439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16917-5_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-16917-5_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16916-8
Online ISBN: 978-3-642-16917-5
eBook Packages: Computer ScienceComputer Science (R0)