{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:17Z","timestamp":1763467817579},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540720362"},{"type":"electronic","value":"9783540720379"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72037-9_10","type":"book-chapter","created":{"date-parts":[[2007,6,21]],"date-time":"2007-06-21T14:15:26Z","timestamp":1182435326000},"page":"162-179","source":"Crossref","is-referenced-by-count":42,"title":["Virtual Walls: Protecting Digital Privacy in Pervasive Environments"],"prefix":"10.1007","author":[{"given":"Apu","family":"Kapadia","sequence":"first","affiliation":[]},{"given":"Tristan","family":"Henderson","sequence":"additional","affiliation":[]},{"given":"Jeffrey J.","family":"Fielding","sequence":"additional","affiliation":[]},{"given":"David","family":"Kotz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Barkhuus, L., Dey, A.: Location-based services for mobile telephony: a study of users\u2019 privacy concerns. In: Proceedings of the 9th IFIP TC13 International Conference on Human-Computer interaction (INTERACT 2003), Z\u00fcrich, Switzerland (Sep. 2003), http:\/\/www.intel-research.net\/Publications\/Berkeley\/072920031046_154.pdf"},{"key":"10_CR2","unstructured":"Barrera, M.H., Okai, J.M.: Digital correspondence: Recreating privacy paradigms. International Journal of Communications Law and Policy\u00a01(3) (1999), http:\/\/www.ijclp.org\/3_1999\/pdf\/ijclp_webdoc_4_3_1999.pdf"},{"key":"10_CR3","unstructured":"Beslay, L., Hakala, H.: Digital territory: Bubbles. Draft publication (2005), http:\/\/cybersecurity.jrc.es\/docs\/DigitalTerritoryBubbles.pdf"},{"key":"10_CR4","unstructured":"Chen, G., Li, M., Kotz, D.: Design and implementation of a large-scale context fusion network. In: Proceedings of Mobiquitous 2004, Boston, MA, USA, Aug. 2004, pp. 246\u2013255 (2004), http:\/\/www.cs.dartmouth.edu\/~dfk\/papers\/chen:fusenet.pdf"},{"issue":"6","key":"10_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1147518.1147533","volume":"4","author":"J. Christensen","year":"2006","unstructured":"Christensen, J., et al.: Too much information. ACM Queue\u00a04(6), 50\u201357 (2006)","journal-title":"ACM Queue"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Cuellar, J.R., et al.: Geopriv requirements. RFC 3693 (Feb. 2004), http:\/\/www.ietf.org\/rfc\/rfc3693.txt","DOI":"10.17487\/rfc3693"},{"key":"10_CR7","unstructured":"Dey, A.K.: Providing Architectural Support for Building Context-Aware Applications. PhD thesis, College of Computing, Georgia Institute of Technology (Dec. 2000)"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","first-page":"251","volume-title":"UbiComp 2005: Ubiquitous Computing","author":"S. Greenberg","year":"2005","unstructured":"Greenberg, S., Neustaedter, C., Elliot, K.: Time, Ownership and Awareness: The Value of Contextual Locations in the Home. In: Beigl, M., et al. (eds.) UbiComp 2005. LNCS, vol.\u00a03660, pp. 251\u2013268. Springer, Heidelberg (2005)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of MobiSys 2003, San Francisco, CA, USA, May 2003, pp. 31\u201342 (2003), http:\/\/www.usenix.org\/events\/mobisys03\/tech\/full_papers\/gruteser\/gruteser.pdf","DOI":"10.1145\/1066116.1189037"},{"key":"10_CR10","unstructured":"Hawkey, K., Inkpen, K.M.: Privacy gradients: exploring ways to manage incidental information during co-located collaboration. In: CHI \u201905 Extended Abstracts on Human Factors in Computing Systems, Portland, OR, USA, Apr. 2005, pp. 1431\u20131434 (2005), http:\/\/doi.acm.org\/10.1145\/1056808.1056934"},{"issue":"3","key":"10_CR11","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/24054.24056","volume":"5","author":"D.A. Henderson Jr.","year":"1986","unstructured":"Henderson Jr., D.A., Card, S.K.: Rooms: the use of multiple virtual workspaces to reduce space contention in a window-based graphical user interface. ACM Transactions on Graphics\u00a05(3), 211\u2013243 (1986), http:\/\/doi.acm.org\/10.1145\/24054.24056","journal-title":"ACM Transactions on Graphics"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Hengartner, U., Steenkiste, P.: Protecting access to people location information. In: Proceedings of the First International Conference on Security in Pervasive Computing, Boppard, Germany, Mar. 2003, pp. 25\u201338 (2003), http:\/\/www.cs.cmu.edu\/~uhengart\/spc03.pdf","DOI":"10.1007\/978-3-540-39881-3_6"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of MobiSys 2004, Boston, MA, USA, June 2004, pp. 177\u2013189 (2004), doi:10.1145\/990064.990087","DOI":"10.1145\/990064.990087"},{"key":"10_CR14","first-page":"248","volume-title":"Proceedings of the 6th ACM Conference on Computer Supported Cooperative Work","author":"S.E. Hudson","year":"1996","unstructured":"Hudson, S.E., Smith, I.: Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In: Proceedings of the 6th ACM Conference on Computer Supported Cooperative Work, Boston, MA, USA, Nov. 1996, pp. 248\u2013257. ACM Press, New York (1996), http:\/\/doi.acm.org\/10.1145\/240080.240295"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Iachello, G., et al.: Developing privacy guidelines for social location disclosure applications and services. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, Pittsburgh, PA, USA (July 2005), http:\/\/doi.acm.org\/10.1145\/1073001.1073008","DOI":"10.1145\/1073001.1073008"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"M. Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by design - principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, pp. 273\u2013291. Springer, Heidelberg (2001)"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013245. Springer, Heidelberg (2002)"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Pervasive Computing","author":"G. Borriello","year":"2006","unstructured":"Borriello, G., Lester, J., Choudhury, T.: A Practical Approach to Recognizing Physical Activities. In: Fishkin, K.P., et al. (eds.) PERVASIVE 2006. LNCS, vol.\u00a03968, pp. 1\u201316. Springer, Heidelberg (2006)"},{"issue":"1","key":"10_CR19","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","unstructured":"Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing\u00a02(1), 56\u201364 (2003), http:\/\/www.computer.org\/pervasive\/pc2003\/b1056abs.htm","journal-title":"IEEE Pervasive Computing"},{"issue":"1-2","key":"10_CR20","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.ijhcs.2005.04.008","volume":"63","author":"B.A. Price","year":"2005","unstructured":"Price, B.A., Adam, K., Nuseibeh, B.: Keeping ubiquitous computing to yourself: A practical model for user control of privacy. International Journal of Human-Computer Studies\u00a063(1-2), 228\u2013253 (2005), http:\/\/www.sciencedirect.com\/science\/article\/B6WGR-4G9GP0G-2\/2\/d8ad215e2e1e1abf9bfb4faa72855b60","journal-title":"International Journal of Human-Computer Studies"},{"issue":"2","key":"10_CR21","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MPRV.2004.1316821","volume":"3","author":"A. Ranganathan","year":"2004","unstructured":"Ranganathan, A., Al-Muhtadi, J., Campbell, R.H.: Reasoning about uncertain contexts in pervasive computing environments. IEEE Pervasive Computing\u00a03(2), 62\u201370 (2004)","journal-title":"IEEE Pervasive Computing"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/941311.941313","volume-title":"Proceedings of the ACM Workshop on Wireless Security","author":"N. Sastry","year":"2003","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the ACM Workshop on Wireless Security, San Diego, CA, USA, Sep. 2003, pp. 1\u201310. ACM Press, New York (2003), http:\/\/www.cs.berkeley.edu\/~nks\/papers\/locprove-wise03.pdf"},{"key":"10_CR23","unstructured":"Schneier, B.: Your vanishing privacy. The Star Tribune, p. 1AA (Mar.\u00a005, 2006)"},{"key":"10_CR24","unstructured":"Sommer, P.: Digital Footprints: Assessing Computer Evidence. Criminal Law Review, 61\u201378 (Dec. 1998), http:\/\/www.giustizia.it\/cassazione\/convegni\/dic2000\/sommer_6.pdf"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11748625_2","volume-title":"Pervasive Computing","author":"E.M. Tapia","year":"2006","unstructured":"Tapia, E.M., Philipose, M., Choudhury, T.: Building Reliable Activity Models Using Hierarchical Shrinkage and Mined Ontology. In: Fishkin, K.P., et al. (eds.) PERVASIVE 2006. LNCS, vol.\u00a03968, pp. 17\u201332. Springer, Heidelberg (2006)"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/1027527.1027537","volume-title":"Proceedings of the 12th Annual ACM International Conference on Multimedia","author":"J. Wickramasuriya","year":"2004","unstructured":"Wickramasuriya, J., et al.: Privacy protecting data collection in media spaces. In: Proceedings of the 12th Annual ACM International Conference on Multimedia, Oct. 2004, pp. 48\u201355. ACM Press, New York (2004), http:\/\/doi.acm.org\/10.1145\/1027527.1027537"},{"key":"10_CR27","unstructured":"Wieffering, E.: Protecting your digital footprints. The Star Tribune, p.\u00a01D (Nov.\u00a007,1999)"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72037-9_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:28:38Z","timestamp":1605763718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72037-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540720362","9783540720379"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72037-9_10","relation":{},"subject":[]}}