Privacy Enforcement Embedded in Mobile Services

Ronald van Eijk, Mortaza Bargh, Alfons Salden, Peter Ebben

2004

Abstract

Next generation mobile services in business-to-employee (B2E) settings put very high demands on the privacy protection features of context-aware, personalization and adaptation enabling technologies. To this end we propose a middle agent framework that allows parties to securely exchange personal or business sensitive contextual information independently of the available networks. In order to demonstrate our privacy enforcing middle agent framework, we build a scheduling service, in which the middle agents collectively arrange an update of a meeting between employees by adapting location and time on the basis of privacy and scheduling policies of the traveling employees themselves or the companies they work for. We developed and deployed this scheduling service on a LEAP agent platform and used a PDA to communicate with the middle agents on the server using WLAN and GPRS networks.

References

  1. M.M. Lankhorst, H. van Kranenburg, A. Salden, and A.J.H.Peddemors (2002). "Enabling Technology for Personalising Mobile Services," HICSS-35, January 2002, Hawaii, USA.
  2. D. Wolpert and K. Tumer (1999). “An Introduction to Collective Intelligence”, Tech Report NASA-ARC-IC-99-63; In: Jeffrey M. Bradshaw, editor, Handbook of Agent Technology, AAAI Press/MIT Press, 1999.
  3. K. Decker, K. Sycara and M. Williamson (1997). “Middle Agents for the Internet”, Proceedings of the 15th International Joint Conference on Artificial Intelligence, Nagoya, Japan, August 23-29, 1997.
  4. P. Langendoerfer. (2002). “M-Commerce: Why it does not fly (yet?)”, SSGRR2002, L'Aquila, Italy, 2002.
  5. F. Bergenti and A. Poggi (2001). “LEAP: a FIPA Platform for Handheld and Mobile Devices”. Presented at ATAL 2001, http://leap.crm-paris.com/
  6. FIPA, Foundation for Intelligent Physical Agents, http://www.fipa.org/.
Download


Paper Citation


in Harvard Style

van Eijk R., Bargh M., Salden A. and Ebben P. (2004). Privacy Enforcement Embedded in Mobile Services . In Proceedings of the 3rd International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2004) ISBN 972-8865-02-3, pages 42-49. DOI: 10.5220/0002669000420049


in Bibtex Style

@conference{wis04,
author={Ronald van Eijk and Mortaza Bargh and Alfons Salden and Peter Ebben},
title={Privacy Enforcement Embedded in Mobile Services},
booktitle={Proceedings of the 3rd International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2004)},
year={2004},
pages={42-49},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002669000420049},
isbn={972-8865-02-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2004)
TI - Privacy Enforcement Embedded in Mobile Services
SN - 972-8865-02-3
AU - van Eijk R.
AU - Bargh M.
AU - Salden A.
AU - Ebben P.
PY - 2004
SP - 42
EP - 49
DO - 10.5220/0002669000420049