{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,13]],"date-time":"2025-04-13T11:40:07Z","timestamp":1744544407672,"version":"3.40.4"},"reference-count":32,"publisher":"Sociedade Brasileira de Computacao - SB","issue":"3","license":[{"start":{"date-parts":[[2012,10,17]],"date-time":"2012-10-17T00:00:00Z","timestamp":1350432000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/2.0"},{"start":{"date-parts":[[2012,10,17]],"date-time":"2012-10-17T00:00:00Z","timestamp":1350432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Internet Serv Appl"],"published-print":{"date-parts":[[2012,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Today there are many location technologies providing people or object location. However, location privacy must be ensured before providing widely disseminated location services. Privacy rules may depend not only on the identity of the requester, but also on past events such as the places visited by the person being located, or previous location queries. Therefore, location systems must support the specification and enforcement of security policies (including history-based) allowing users to specify when, how and whom may know their location. We propose a middleware platform named Jano [Jano (or<jats:italic>JANVS<\/jats:italic>in latin) is the god of doors and gates in the roman mythology. He is usually depicted with two or four faces turning in opposite directions.] supporting both pull and push location requests while enforcing configurable security policies. Policies are specified using the<jats:italic>Security Policy Language, SPL<\/jats:italic>, facilitating the use of well-known security models. In particular, Jano supports history-based policies applied to person\u2019s or object\u2019s location. Jano implementation integrates several location technologies (e.g. GPS, RFID, etc.) and deals with the related heterogeneity aspects. It provides a web-based interface that facilitates policy specification, and its evaluation shows good performance, embodying a number of optimizations regarding bandwidth, process and storage savings.<\/jats:p>","DOI":"10.1007\/s13174-012-0065-z","type":"journal-article","created":{"date-parts":[[2012,10,17]],"date-time":"2012-10-17T19:50:23Z","timestamp":1350503423000},"page":"291-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Jano: location-privacy enforcement in mobile and pervasive environments through declarative policies"],"prefix":"10.5753","volume":"3","author":[{"given":"Jos\u00e9","family":"Sim\u00e3o","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Ribeiro","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Ferreira","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds","family":"Veiga","sequence":"additional","affiliation":[]}],"member":"3742","published-online":{"date-parts":[[2012,10,17]]},"reference":[{"key":"65_CR1","doi-asserted-by":"crossref","unstructured":"Ardagna CA, Cremonini M, Damiani E, De Capitani di Vimercati S, Samarati P (2007) Location privacy protection through obfuscation-based techniques. In: Lecture notes in computer science, vol 4602. Springer, Berlin, pp 47\u201360","DOI":"10.1007\/978-3-540-73538-0_4"},{"key":"65_CR2","doi-asserted-by":"crossref","unstructured":"Bahl P, Padmanabhan VN (2000) Radar: an in-building rf-based user location and tracking system. In: INFOCOM 2000. Nineteenth annual joint conference of the IEEE Computer and Communications Societies. Proceedings, vol 2. IEEE, pp 775\u2013784","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"65_CR3","unstructured":"Beresford AR (2005) Location privacy in ubiquitous computing. Technical Report 612, University of Cambridge"},{"key":"65_CR4","unstructured":"Bevier WR, Young WD (1997) A constraint language for Adage. Inc, Technical report, Computational Logic"},{"key":"65_CR5","doi-asserted-by":"crossref","unstructured":"Bhola SK, Banavar GS, Ahamad M (1998) Responsiveness and consistency tradeoffs in interactive groupware","DOI":"10.1145\/277697.277785"},{"key":"65_CR6","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom BH (1970) Space\/time trade-offs in hash coding with allowable errors. Commun ACM 13:422\u2013426","journal-title":"Commun ACM"},{"key":"65_CR7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511812415","volume-title":"Organizational design: a step-by-step approach","author":"RM Burton","year":"2006","unstructured":"Burton RM, DeSanctis R, Obel B (2006) Organizational design: a step-by-step approach. Cambridge University Press, Cambridge"},{"key":"65_CR8","unstructured":"Cheshire S (1996) Latency and the quest for interactivity. In: White paper commissioned by Volpe Welty Asset Management, LLC., for the synchronous person-to-person interactive computing environments meeting"},{"key":"65_CR9","doi-asserted-by":"crossref","unstructured":"Cornelius C, Kapadia A, Kotz D, Peebles D, Shin M, Triandopoulos N (2008) AnonySense: privacy-aware people-centric sensing. In: Proceeding of the 6th international conference on mobile systems, applications, and services. ACM, New York, pp 211\u2013 224","DOI":"10.1145\/1378600.1378624"},{"key":"65_CR10","doi-asserted-by":"crossref","unstructured":"Blaze et al M (1999) Rfc 2704: the keynote trust-management system version 2","DOI":"10.17487\/rfc2704"},{"key":"65_CR11","doi-asserted-by":"crossref","unstructured":"Garlan D, Siewiorek DP, Smailagic A, Steenkiste P (2002) Project aura: toward distraction-free pervasive computing. PERVASIVE Computing, pp 22\u201331","DOI":"10.1109\/MPRV.2002.1012334"},{"key":"65_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mobile Comput 7:1\u201318","journal-title":"IEEE Trans Mobile Comput"},{"key":"65_CR13","doi-asserted-by":"crossref","unstructured":"Hengartner U, Steenkiste P (2003) Protecting access to people location information. In: First international conference on security in pervasive computing, pp 25\u201338","DOI":"10.1007\/978-3-540-39881-3_6"},{"issue":"8","key":"65_CR14","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/2.940014","volume":"34","author":"J Hightower","year":"2001","unstructured":"Hightower J, Borriello G (2001) Location systems for ubiquitous computing. IEEE Comput 34(8):57\u201366","journal-title":"IEEE Comput"},{"key":"65_CR15","doi-asserted-by":"crossref","unstructured":"Hong JI (2004) An architecture for privacy-sensitive ubiquitous computing. In: MobiSYS 04: Proceedings of the 2nd international conference on mobile systems, applications, and services, pp 177\u2013189. ACM Press, New York","DOI":"10.1145\/990064.990087"},{"issue":"2","key":"65_CR16","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S Jajodia","year":"2001","unstructured":"Jajodia S, Samarati P, Sapino ML, Subramanian VS (June 2001) Flexible support for multiple access control policies. ACM Trans Database Syst 26(2):214\u2013260","journal-title":"ACM Trans Database Syst"},{"key":"65_CR17","doi-asserted-by":"crossref","unstructured":"Kelley PG, Drielsma PH, Sadeh N, Cranor LF. User-controllable learning of security and privacy policies. In: Proceedings of the 1st ACM workshop on workshop on AISec, AISec \u201908, New York, NY, USA. ACM, New York, pp 11\u201318","DOI":"10.1145\/1456377.1456380"},{"key":"65_CR18","doi-asserted-by":"crossref","unstructured":"Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: UbiComp \u201902: Proceedings of the 4th international conference on Ubiquitous Computing, London, UK, 2002. Springer, Berlin, pp 237\u2013245","DOI":"10.1007\/3-540-45809-3_19"},{"key":"65_CR19","unstructured":"Leonhardt U, Magee J (1998) Stability considerations for a distributed location service. J Netw Syst Manage 6(1)"},{"key":"65_CR20","doi-asserted-by":"crossref","unstructured":"Minch R (2011) Issues in the development of location privacy theory. In: Proceedings of the 2011 44th Hawaii international conference on system sciences, HICSS \u201911, Washington, DC, USA. IEEE Computer Society, pp 1\u201310","DOI":"10.1109\/HICSS.2011.262"},{"key":"65_CR21","unstructured":"Mokbel MF, Chow CY, Aref WG (2006) The new Casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on very large data bases. VLDB Endowment, p 774"},{"key":"65_CR22","doi-asserted-by":"crossref","unstructured":"Myles G, Friday A, Davies N (2003) Preserving privacy in environments with location-based applications. Pervasive computing, pp 56\u201364","DOI":"10.1109\/MPRV.2003.1186726"},{"key":"65_CR23","first-page":"17","volume":"2","author":"O Lukasz","year":"2007","unstructured":"Lukasz O, Atul P, Amit A (2007) Supporting privacy policies in a publish-subscribe substrate for pervasive environments. J Netw 2:17\u201326","journal-title":"J Netw"},{"key":"65_CR24","unstructured":"Ribeiro C (2002) Uma Plataforma Para Politicas de Autorizacao Para Organizacoes Complexas. PhD thesis, Instituto Superior Tecnico, Lisbon, Portugal"},{"key":"65_CR25","unstructured":"Ribeiro C, Zuquete A, Ferreira P, Guedes P (2001) Spl: an access control language for security policies and complex constraints. In: NDSS, The Internet Society"},{"key":"65_CR26","doi-asserted-by":"crossref","unstructured":"Samarati P, De Capitani di Vimercati S (2001) Access control: policies, models, and mechanisms. In: Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: tutorial lectures, FOSAD \u201900, London, UK. Springer, Berlin, pp 137\u2013196","DOI":"10.1007\/3-540-45608-2_3"},{"issue":"11","key":"65_CR27","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"R Sandhu","year":"1993","unstructured":"Sandhu R (1993) Lattice-based access control models. IEEE Comput 26(11):9\u201319","journal-title":"IEEE Comput"},{"key":"65_CR28","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1023\/A:1008787208430","volume":"9","author":"O Stiemerling","year":"2000","unstructured":"Stiemerling O, Wulf V (2000) Beyond \"yes or no\"\u2014extending access control in groupware with awareness and negotiation. Group Decis Negot 9:221\u2013235. doi:10.1023\/A:1008787208430","journal-title":"Group Decis Negot"},{"key":"65_CR29","doi-asserted-by":"crossref","unstructured":"Toch E, Cranshaw J, Drielsma PH, Tsai JY, Kelley PG, Springfield J, Cranor L, Hong J, Sadeh N (2010) Empirical models of privacy in location sharing. In: Proceedings of the 12th ACM international conference on ubiquitous computing, Ubicomp \u201910, New York, NY, USA. ACM, New York, pp 129\u2013138","DOI":"10.1145\/1864349.1864364"},{"key":"65_CR30","unstructured":"Tsai JY, Kelley PG, Cranor LF, Sadeh N (2009) Location-sharing technologies: privacy risks and controls. In: Research conference on communication, information and internet policy (TPRC)"},{"issue":"3","key":"65_CR31","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/857166.857169","volume":"3","author":"U Varshney","year":"2003","unstructured":"Varshney U (2003) Location management for mobile commerce applications in wireless internet environment. ACM Trans Interet Technol 3(3):236\u2013255","journal-title":"ACM Trans Interet Technol"},{"key":"65_CR32","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s11276-006-5064-1","volume":"13","author":"GV Zaruba","year":"2007","unstructured":"Zaruba GV, Huber M, Kamangar FA, Chlamtac I (2007) Indoor location tracking using rssi readings from a single wi-fi access point. Wirel Netw 13:221\u2013235","journal-title":"Wirel Netw"}],"container-title":["Journal of Internet Services and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13174-012-0065-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13174-012-0065-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/s13174-012-0065-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13174-012-0065-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,13]],"date-time":"2025-04-13T11:19:15Z","timestamp":1744543155000},"score":1,"resource":{"primary":{"URL":"https:\/\/jisajournal.springeropen.com\/articles\/10.1007\/s13174-012-0065-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,17]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["65"],"URL":"https:\/\/doi.org\/10.1007\/s13174-012-0065-z","relation":{},"ISSN":["1867-4828","1869-0238"],"issn-type":[{"type":"print","value":"1867-4828"},{"type":"electronic","value":"1869-0238"}],"subject":[],"published":{"date-parts":[[2012,10,17]]},"assertion":[{"value":"8 August 2011","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2012","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2012","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}