@article{TatliLucks, author = {Tatli, Emin Islam and Lucks, Stefan}, title = {Mobile Identity Management Revisited}, series = {Electronic Notes in Theoretical Computer Science}, journal = {Electronic Notes in Theoretical Computer Science}, doi = {10.1016/j.entcs.2009.07.044}, url = {http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20170426-31640}, pages = {125 -- 137}, abstract = {Identity management provides PET (privacy enhancing technology) tools for users to control privacy of their personal data. With the support of mobile location determination techniques based on GPS, WLAN, Bluetooth, etc., context-aware and location-aware mobile applications (e.g. restaurant finder, friend finder, indoor and outdoor navigation, etc.) have gained quite big interest in the business and IT world. Considering sensitive static personal information (e.g. name, address, phone number, etc.) and also dynamic personal information (e.g. current location, velocity in car, current status, etc.), mobile identity management is required to help mobile users to safeguard their personal data. In this paper, we evaluate certain required aspects and features (e.g. context-to-context dependence and relation, blurring in levels, trust management with p3p integration, extended privacy preferences, etc.) of mobile identity management}, subject = {Privatsph{\"a}re}, language = {en} } @techreport{GrossOemig2008, author = {Gross, Tom and Oemig, Christoph}, title = {Presence, Privacy, and PRIMIFaces: Towards Selective Information Disclosure in Instant Messaging}, doi = {10.25643/bauhaus-universitaet.1275}, url = {http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20080314-13452}, year = {2008}, abstract = {Efficient distant cooperation often requires spontaneous ad-hoc social interaction, which is only possible with adequate information on the prospective communication partner. This often requires disclosing and sharing personal information via tools such as instant messaging systems and can conflict with the users' wishes for privacy. In this paper we present an initial study investigating this trade-off and discuss implications for the design of instant messaging systems. We present the functionality and design of the PRIMIFaces instant messaging prototype supporting flexible identity management and selective information disclosure.}, subject = {Angewandte Informatik}, language = {en} } @techreport{GrossFetterSeifert2007, author = {Gross, Tom and Fetter, Mirko and Seifert, Julian}, title = {CoDaMine: Supporting Privacy and Trust Management in Ubiquitous Environments Through Communication Data Mining}, doi = {10.25643/bauhaus-universitaet.815}, url = {http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20111215-8154}, year = {2007}, abstract = {In ubiquitous environments an increasing number of sensors capture information on users and at the same time an increasing number of actuators are available to present information to users. This vast capturing of information potentially enables the system to adapt to the users. At the same time the system might violate the users' privacy by capturing information that the users do not want to share, and the system might disrupt the users by being too obtrusive in its adaptation or information supply. In this paper we present CoDaMine - a novel approach for providing users with system - generated feedback and control in ubiquitous environments giving them the freedom they need while reducing their effort. Basically, CoDaMine captures and analyses the users' online communication to learn about their social relationships in order to provide them with recommendations for inter-personal privacy and trust management.}, subject = {Angewandte Informatik}, language = {en} }