TY - JOUR A1 - Tatli, Emin Islam A1 - Lucks, Stefan T1 - Mobile Identity Management Revisited JF - Electronic Notes in Theoretical Computer Science N2 - Identity management provides PET (privacy enhancing technology) tools for users to control privacy of their personal data. With the support of mobile location determination techniques based on GPS, WLAN, Bluetooth, etc., context-aware and location-aware mobile applications (e.g. restaurant finder, friend finder, indoor and outdoor navigation, etc.) have gained quite big interest in the business and IT world. Considering sensitive static personal information (e.g. name, address, phone number, etc.) and also dynamic personal information (e.g. current location, velocity in car, current status, etc.), mobile identity management is required to help mobile users to safeguard their personal data. In this paper, we evaluate certain required aspects and features (e.g. context-to-context dependence and relation, blurring in levels, trust management with p3p integration, extended privacy preferences, etc.) of mobile identity management KW - Privatsphäre KW - Anwendung KW - P3P KW - privacy, mobile identity management, location-based applications, p3p Y1 - 2009 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:gbv:wim2-20170426-31640 SP - 125 EP - 137 ER - TY - RPRT A1 - Gross, Tom A1 - Oemig, Christoph T1 - Presence, Privacy, and PRIMIFaces: Towards Selective Information Disclosure in Instant Messaging N2 - Efficient distant cooperation often requires spontaneous ad-hoc social interaction, which is only possible with adequate information on the prospective communication partner. This often requires disclosing and sharing personal information via tools such as instant messaging systems and can conflict with the users’ wishes for privacy. In this paper we present an initial study investigating this trade-off and discuss implications for the design of instant messaging systems. We present the functionality and design of the PRIMIFaces instant messaging prototype supporting flexible identity management and selective information disclosure. KW - Angewandte Informatik KW - Awareness KW - Gruppengewahrsein KW - Privatsphäre KW - Reziprozität KW - Ubiquitous Computing KW - Awareness KW - Group Awareness KW - Privacy KW - Reciprocity KW - Ubiquitous Computing Y1 - 2008 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:gbv:wim2-20080314-13452 ER - TY - RPRT A1 - Gross, Tom A1 - Fetter, Mirko A1 - Seifert, Julian T1 - CoDaMine: Supporting Privacy and Trust Management in Ubiquitous Environments Through Communication Data Mining N2 - In ubiquitous environments an increasing number of sensors capture information on users and at the same time an increasing number of actuators are available to present information to users. This vast capturing of information potentially enables the system to adapt to the users. At the same time the system might violate the users' privacy by capturing information that the users do not want to share, and the system might disrupt the users by being too obtrusive in its adaptation or information supply. In this paper we present CoDaMine - a novel approach for providing users with system - generated feedback and control in ubiquitous environments giving them the freedom they need while reducing their effort. Basically, CoDaMine captures and analyses the users' online communication to learn about their social relationships in order to provide them with recommendations for inter-personal privacy and trust management. KW - Angewandte Informatik KW - Awareness KW - Gruppengewahrsein KW - Privatsphäre KW - Reziprozität KW - Ubiquitous Computing KW - Awareness KW - Group Awareness KW - Privacy KW - Reciprocity KW - Ubiquitous Computing Y1 - 2007 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:gbv:wim2-20111215-8154 ER -