Linking privacy and user preferences in the identity management for a pervasive system

Elizabeth Papadopoulou, Sarah McBurney, Nick Taylor, Howard Williams

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Two important concepts in developing ubiquitous or pervasive computing technologies that are acceptable to the end user are personalization and privacy. On the one hand it is essential to take account of user needs and preferences to personalize decision making within such a system, on the other hand it is equally important to protect user privacy. One approach to handling user privacy is through the use of virtual identities. This has the advantage that it can also benefit the handling of user preferences. In particular, virtual identities can be used as a substitute for roles. On the other hand user preferences can be used in identity management to assist in selecting a virtual identity to hide the real identity of the user, thereby improving userfriendliness of the system. This paper describes this symbiosis and how it is implemented in the Daidalos pervasive system. © 2008 IEEE.

Original languageEnglish
Title of host publicationProceedings - 2008 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2008
Pages192-195
Number of pages4
DOIs
Publication statusPublished - 2008
Event2008 IEEE/WIC/ACM International Conference on Web Intelligence - Sydney, NSW, Australia
Duration: 9 Dec 200812 Dec 2008

Conference

Conference2008 IEEE/WIC/ACM International Conference on Web Intelligence
Abbreviated titleWI 2008
CountryAustralia
CitySydney, NSW
Period9/12/0812/12/08

Fingerprint Dive into the research topics of 'Linking privacy and user preferences in the identity management for a pervasive system'. Together they form a unique fingerprint.

Cite this