Skip to main content
Article thumbnail
Location of Repository

The development of a privacy-enhancing infrastructure: Some interesting findings

By Patrik Osbakk and Nick S. Ryan


Providing privacy protection for ubiquitous environments is a complex task that has only recently has become a hot topic. In this paper we describe the current state of our privacy-enhancing infrastructure and address some issues that have arisen during its evolution. In particular we contrast users online and offline privacy concerns, and their perceived and actual performance in configuring access control mechanisms. We also present a brief assessment of cryptographic performance on small devices

Topics: QA76
Publisher: Computing Laboratory University of Kent
Year: 2004
OAI identifier:

Suggested articles


  1. (1978). A Method for Obtaining Digital Signatures andPublic-Key Cryptosystems”, doi
  2. (2002). A Privacy Awareness System for Ubiquitous Computing Environments”. UbiComp doi
  3. (2003). A Privacy Enhancing Infrastructure for Context-Awareness”. 1st UK-UbiNet Workshop,
  4. Context-awareness and privacy: an inevitable clash?” Last accessed:
  5. Corp. “iButton Overview”. Last accessed:
  6. (2004). Expressing Privacy Preferences in terms of Invasiveness”. 2nd UK-UbiNet Workshop,
  7. (2003). Last accessed:
  8. Legion of the Bouncy Castle. “The Bouncy Castle Crypto package (release 1.21)”. Last accessed:
  9. (2002). People, Places, Things: Web Presence for the Real World”. doi
  10. (1970). Privacy and freedom. doi
  11. (2002). Protecting Privacy with Economics: Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments”.
  12. (1996). Role-Based Access Control Models". doi
  13. (2003). Security Problems in 802.11-based Networks”. doi
  14. (2002). The Computer for the 21 st Century”. Pervasive Computing 1(1):19-25. Reprint from doi
  15. (2002). The Computer for the 21st Century”. Pervasive Computing 1(1):19-25. Reprint from doi
  16. (2000). The Context Toolkit: Aiding the development of Context-Aware Applications". Workshop on Software Engineering for wearable and pervasive computing.
  17. (2003). The MobiComp Infrastructure”. Last accessed: 22/07/2004.
  18. (2001). The TINI Specification and Developer's Guide”,
  19. (1999). There is more to Context than Location". doi
  20. (2001). Trust-Based Security in Pervasive Computing Environments". doi

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.