Privacy in pervasive environments: next generation labeling protocols
dc.contributor.author | Ackerman, Mark S. | en_US |
dc.date.accessioned | 2006-09-11T17:09:13Z | |
dc.date.available | 2006-09-11T17:09:13Z | |
dc.date.issued | 2004-11 | en_US |
dc.identifier.citation | Ackerman, Mark S.; (2004). "Privacy in pervasive environments: next generation labeling protocols." Personal and Ubiquitous Computing 8(6): 430-439. <http://hdl.handle.net/2027.42/45919> | en_US |
dc.identifier.issn | 1617-4909 | en_US |
dc.identifier.issn | 1617-4917 | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/45919 | |
dc.description.abstract | In pervasive environments, privacy is likely to be a major issue for users, and users will want to be notified of potential data capture. To provide notice to users, this paper argues for what it calls labeling protocols, technical mechanisms through which users can be informed of data requests and their consequences. Recent experiences with the Platform for Privacy Preferences Project (P3P), an attempt to provide privacy mechanisms for the Web, suggest important lessons for the design of a next generation labeling protocol that will be usable and useful in pervasive environments. This paper examines the P3P lessons and open issues with an eye to pervasive requirements. | en_US |
dc.format.extent | 221639 bytes | |
dc.format.extent | 3115 bytes | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | text/plain | |
dc.language.iso | en_US | |
dc.publisher | Springer-Verlag; Springer-Verlag London Limited | en_US |
dc.subject.other | Pervasive Environments | en_US |
dc.subject.other | Platform for Privacy Preferences | en_US |
dc.subject.other | ComputerScience | en_US |
dc.subject.other | Labeling Protocols | en_US |
dc.subject.other | Privacy | en_US |
dc.subject.other | Ubiquitous Computing | en_US |
dc.subject.other | P3P | en_US |
dc.title | Privacy in pervasive environments: next generation labeling protocols | en_US |
dc.type | Article | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.description.peerreviewed | Peer Reviewed | en_US |
dc.contributor.affiliationum | Department of Electrical Engineering and Computer Science and School of Information, University of Michigan, Ann Arbor, MI, 48109, USA | en_US |
dc.contributor.affiliationumcampus | Ann Arbor | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/45919/1/779_2004_Article_305.pdf | en_US |
dc.identifier.doi | http://dx.doi.org/10.1007/s00779-004-0305-8 | en_US |
dc.identifier.source | Personal and Ubiquitous Computing | en_US |
dc.owningcollname | Interdisciplinary and Peer-Reviewed |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.