<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Implementing Privacy as Symmetry in Location-aware Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Anders</forename><surname>Kofod-Petersen</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer and Information Science</orgName>
								<orgName type="institution">Norwegian University of Science and Technology</orgName>
								<address>
									<postCode>7491</postCode>
									<settlement>Trondheim</settlement>
									<country key="NO">Norway</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Espen</forename><surname>Klaeboe</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer and Information Science</orgName>
								<orgName type="institution">Norwegian University of Science and Technology</orgName>
								<address>
									<postCode>7491</postCode>
									<settlement>Trondheim</settlement>
									<country key="NO">Norway</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jørgen</forename><surname>Jervidalo</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer and Information Science</orgName>
								<orgName type="institution">Norwegian University of Science and Technology</orgName>
								<address>
									<postCode>7491</postCode>
									<settlement>Trondheim</settlement>
									<country key="NO">Norway</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Kjetil</forename><surname>Aaltvedt</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer and Information Science</orgName>
								<orgName type="institution">Norwegian University of Science and Technology</orgName>
								<address>
									<postCode>7491</postCode>
									<settlement>Trondheim</settlement>
									<country key="NO">Norway</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Magnus</forename><surname>Romnes</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer and Information Science</orgName>
								<orgName type="institution">Norwegian University of Science and Technology</orgName>
								<address>
									<postCode>7491</postCode>
									<settlement>Trondheim</settlement>
									<country key="NO">Norway</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Trond</forename><forename type="middle">Martin</forename><surname>Nyhus</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer and Information Science</orgName>
								<orgName type="institution">Norwegian University of Science and Technology</orgName>
								<address>
									<postCode>7491</postCode>
									<settlement>Trondheim</settlement>
									<country key="NO">Norway</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Implementing Privacy as Symmetry in Location-aware Systems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">DABE280071FE1D91A5103A4597510346</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T05:28+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Social network services on the internet are moving from a traditional web-based service into ubiquitous computing environments. With this migration these services will also benefit from the contextawares that ubiquitous computing offers. Applications that sense the environment and act proactively, requires an immaculate attention to users' privacy. The work presented here approaches privacy by employing the principle of minimum asymmetry to a mobile social network service. We demonstrate how this principle can be implemented on a simple location-aware application running on standard mobile telephones in a traditional GSM network.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The number and popularity of digital social networks have been steadily increasing over the last few years. Privacy and trust are important issues in these social aware applications. The importance will increase tremendously when social aware applications are moved into mobile or pervasive applications. When applications assume responsibility from the user and act proactively, as pervasive applications do by definition, the control over what information is shared and to whom becomes paramount.</p><p>One important approach to maintain privacy and trust in pervasive applications is the principle of minimal asymmetry, which in short states that the ability to obtain information should be coupled with the sharing of information. The work presented here demonstrates how how this principle can be applied in a mobile social-aware application. The application implements location-awareness on standard mobile phones in running in a GSM network.</p><p>The rest of the paper is organised as follows: First, an overview of related work concerning privacy in ubiquitous computing is presented. This is followed by a description of the systems design and implementation. The paper ends with a summary and pointers to future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related Work</head><p>Social systems that link people to people, and people to geographical places are referred to as P3 systems <ref type="bibr" target="#b0">[1]</ref>. P3 systems can be divided into two difference categories: people-centered and place-centered. An example of a people-centered system might be one where a user has a contact list, where the contacts show up in different colours (green, yellow, red) depending on their proximity. Jones and Grandhi presented a survey executed at various places in Manhattan with more that 500 participants. Among other things, they discovered that 84% of the participants were willing to share their location data (anonymously) to get information about crowding and occupancy in public places. They concluded that a large population considered P3 systems to be sufficiently beneficial to disclose their position. The fact that this percentage of the population were willing to give away their position in exchange for a service that they considered beneficial is an important insight when modelling context-aware systems, and perhaps even more important when systems are to reason about what (contextual) information they can share and to whom.</p><p>With regard to privacy in context-aware systems, Langheinrich <ref type="bibr" target="#b1">[2]</ref> describes why privacy is of particular importance in ubiquitous computing with four properties: ubiquity, computers are everywhere; invisibility, computers disappear from the scene; sensing, sensors are becoming more precise; and memory amplification, storing of large amount of (sensed) data.</p><p>Many of the privacy issues in context-aware systems are related to the issue of mutual awareness. One part of this problem is about disembodiment and dissociation. When we encounter people in the real world we can receive information in many ways, such as position, voice level, face expression and direction of gaze. In ubiquitous environments these communication channels are likely to be less effective. In real life people live by the intuitive principle that if you cannot see me, I cannot see you. Due to the potential large number of sensors in an ubiquitous environment, this is not always true. Users may not always know exactly what information they are conveying, in what form, if it is permanent, and to whom they are sending <ref type="bibr" target="#b2">[3]</ref>.</p><p>Jiang et al. <ref type="bibr" target="#b3">[4]</ref> discusses the principle of minimum asymmetry when dealing with privacy issues in ubiquitous computing. This principle goes a long way towards handling the apparent asymmetric relationship between sender and receiver of information, as described by Bellotti et al. <ref type="bibr" target="#b2">[3]</ref>. Jiang et at. argue that a privacy-aware system should minimise the asymmetry of information between data owners and data users. For an example, if a user does not wish to share his location he cannot expect others to share their location with him (regardless of their wish). The main principle is that <ref type="bibr">[4, p. 7</ref></p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>] (original emphasis):</head><p>A privacy aware system should' minimize the asymmetry of information between data owners and data collectors and data users, by:</p><p>-Decreasing the flow of information from data owners to data collectors and users</p><p>-Increasing the flow of information from data collectors and users back to data owners</p><p>When decreasing the flow of information from the data owner the user maintains a higher degree of control over the system. Increasing information flow from the data collector provides better feedback to the user. Examples of mechanisms that adhere to this principle are: anonymising or pseudonymising, which approaches privacy by allowing users to act in total anonymity or through a consistent avatar that cannot be coupled with a real person. Further, plausible deniability allows the user to plausible deny that he did not wish to interact with a particular person, at a given time <ref type="bibr" target="#b4">[5]</ref>. Finally, reciprocity is the essential property for building trust and deep relationships. Sharing too little or too much information might have a negative effect on relations to one's peers. Balancing the amount on information flowing between peers are very important to maintain a balance in any relationship. Social systems often approaches this by for an example only allowing you to see the status of the people whom you allow to see your status. To receive better feedback from the system it might log all access to one's position data, notify the user when somebody requests a position, and give clear feedback on what information is stored <ref type="bibr" target="#b3">[4]</ref>.</p><p>Lederer et al. <ref type="bibr" target="#b5">[6]</ref> argues that feedback and control is "the designer's opportunity to empower those processes (understanding and action), and they are the user's opportunity to practice them." The authors exemplify pitfalls in design of systems maintaining privacy using their personal experience. The pitfalls can be divided into two main groups: feedback and control. The feedback pitfalls are: obscuring potential information flow, where systems do not explicitly describe the possible disclosures it can make; and obscuring actual information flow, where a system might not explicitly make clear what information is actually disclosed. The control pitfalls are: emphasising configuration over action, where configuration overshadows the privacy management actually needed to adapt to a user's ordinary use of the system; lacking coarse-grained control, where a system offers too many choices and not just simple on/off choices; and Inhibiting existing practice, where a system forces some required practice onto a user, and does not adapt to the user's practice.</p><p>As aforementioned, digital social networks have recently emerged, and along with them several communication protocols and representational models. Among these are: XHTML Friends Network (XFN), Friend of a Friend (FOAF) and Extensible Messaging and Presence Protocol (XMPP) commonly known as Jabber.</p><p>XFN 1 is a decentralised markup language that captures social connectivity. This language can represent different forms of social connectivity, such as the level of friendship, professional relations, geographical proximity, family ties and romantic aspects. XFN maintains some privacy related limitations, such as the fact that many personal attributes cannot be assigned by others. Some examples of these include: gender, race and age. This limitation is founded in the fact that a user describes a relation to another person from that user's perspective, and not the friend. Since a "friendship" in XFN is directional relationship managed solely by the user who initiates a relation, the principle of minimal asymmetry seems hard to maintain.</p><p>FOAF<ref type="foot" target="#foot_1">2</ref> is like XFN a modelling language used to represent social relations. FOAF have chosen RDF, a more expressive language that XHTML chosen by XFN. FOAF is currently an immature language, which does not explicitly cover issues such as control of data within a community of trust, guaranty of facts and general privacy of data.</p><p>XMPP <ref type="foot" target="#foot_2">3</ref> , or Jabber as it is commonly know, is a message protocol for instant messaging services <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. The Jabber specification defines a XML streaming protocol that covers not only instant messaging but also issues such as presence. As the XML protocol is extensible, the core functionality such as authentication, privacy mechanisms and chatting are easily extensible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Design and Implementation</head><p>Find Per Anton (hereby referred to as "the application") is a location-aware instant messaging application developed for mobile phones. It utilises the underlying TCP/IP-network capabilities (such as GRPS, UMTS and Wi-Fi) of the mobile phone and will supplement a similar application based on Wi-Fi technology <ref type="bibr" target="#b8">[9]</ref>. The localisation service is obtained from the third party provider Geomatikk<ref type="foot" target="#foot_3">4</ref> and all transmissions between the server and the client uses the XMMP protocol.</p><p>The idea is to have the opportunity to sort your friends in groups, locate one friend or a whole group on the map and also be able to send messages to contacts or whole groups. The application provides feedback about the locations of the peers of a user by indicating their proximity using colours ranging from red to green and by showing their position on a map. An example of how the map service might look can be seen in Fig. <ref type="figure" target="#fig_0">1</ref>.</p><p>Table <ref type="table">1</ref>. Presence states allowed by the XMPP standard.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Name:</head><p>Description:</p><p>offline The entity or resource is not connected to the server. chat</p><p>The entity or resource is actively interested in chatting. away</p><p>The entity or resource is temporarily away. dnd</p><p>The entity or resource is busy (dnd = "Do Not Disturb"). xa</p><p>The entity or resource is away for an extended period (xa = "eXtended Away"). As mentioned above the application design builds on the XMPP standards <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. Unfortunately, XMPP does not enforce the principle of minimum assymmetry, which is a requirement for the application. For this reason, a deviation was made between the original specification and the application design by only supporting a subset of the XMPP subscription states. The subscription states supported by the original XMPP specification can be seen in Table <ref type="table" target="#tab_0">2</ref>. Every subscription state except None and Both was omitted from the application design because they contradict the principle of minimum asymmetry by allowing a user to receive information without releasing information himself. In the XMPP standard, adding a contact is refered to as subscribing to a contact and a contact list is refered to as a roster list, so we will use these terms from now on.</p><p>In order to establish a subscription, both users must agree to share presence information and location information with the other part. This requirement allows the application to enforce the principle of minimum asymmetry. The presence information contains the current status of the user, which may be away, chat, dnd, xa or offline. A detailed description of the presence status can be found in Table <ref type="table">1</ref>. The location information contains the longitude and latitude of a user, and will appear graphically as a position on a map. This way a user can physically locate the position of any of his contacts, in return for being discoverable himself. A user can temporarily make himself invisible to others, but he is then no longer entitled to receive any location information, until he makes himself discoverable again, as discussed by Jiang et. al <ref type="bibr" target="#b3">[4]</ref>. When he makes himself invisible, he will appear as offline to his contacts, just as if he had turned off his mobile phone. When a user cancels a subscription, the contact is not notified. The contact is removed from the user's roster list, but the user is only shown as offline on the contact's roster list, thus preserving minimum asymmetry and plausible deniability.</p><p>In Listing 1.1, we show a simplified pseudo code example of how a user adds a subscriber (contact) to his roster list in the application. The client sends a request for a new subscription to the server, using the method newSubscription(). The server checks the current subscription state for the subscriber. In an initial state, there will not exist any relations between the user and the contact, so the server will store the new subscription state (None) and send a subscription request to the contact. If the contact accepts the subscription request, his client will send a subscription request to the server, again using the same newSubscription()method. This time, when the server receives the request, there already exists a relation between the user and the contact, so the server sets the subscription states to Both for the user and the contact, adds them to the respective roster lists and pushes the new roster lists to both clients. The symmetrical subscription state Both is the only state where positioning, presence notifications or messaging is allowed.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. An example of the map service running on a mobile device</figDesc><graphic coords="5,252.24,115.83,110.88,241.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 2 .</head><label>2</label><figDesc>Subscription states supported by the XMPP standard, described from the user's perspective.</figDesc><table><row><cell>Name:</cell><cell>Description:</cell></row><row><cell>"None"</cell><cell>Contact and user are not subscribed to each other, and</cell></row><row><cell></cell><cell>neither has requested a subscription from the other.</cell></row><row><cell>"None + Pending Out"</cell><cell>Contact and user are not subscribed to each other, and</cell></row><row><cell></cell><cell>user has sent contact a subscription request but contact</cell></row><row><cell></cell><cell>has not replied yet.</cell></row><row><cell>"None + Pending In"</cell><cell>Contact and user are not subscribed to each other, and</cell></row><row><cell></cell><cell>contact has sent user a subscription request but user has</cell></row><row><cell></cell><cell>not replied yet.</cell></row><row><cell cols="2">"None + Pending Out/In" Contact and user are not subscribed to each other, con-</cell></row><row><cell></cell><cell>tact has sent user a subscription request but user has</cell></row><row><cell></cell><cell>not replied yet, and user has sent contact a subscription</cell></row><row><cell></cell><cell>request but contact has not replied yet.</cell></row><row><cell>"To"</cell><cell>User is subscribed to contact (one-way).</cell></row><row><cell>"To + Pending In"</cell><cell>User is subscribed to contact, and contact has sent user</cell></row><row><cell></cell><cell>a subscription request but user has not replied yet.</cell></row><row><cell>"From"</cell><cell>Contact is subscribed to user (one-way).</cell></row><row><cell>"From + Pending Out"</cell><cell>Contact is subscribed to user, and user has sent contact</cell></row><row><cell></cell><cell>a subscription request but contact has not replied yet.</cell></row><row><cell>"Both"</cell><cell>User and contact are subscribed to each other (two-way).</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">http://gmpg.org/xfn/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">http://www.foaf-project.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">http://www.xmpp.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_3">http://www.geomatikk.no/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_4">This research is currently being prepared for publication</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgements</head><p>Parts of this work has been supported by Accenture Innovation Lab Norway. We would like to extend our thanks to Per Anton Gransaether for his assistance.</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>When a user wants to remove a subscriber from his roster list, we must not only enforce the principle of minimum asymmetry, but also retain privacy for the user. In other words, the removal has to be done in a discrete way. Pseudo code showing how this is handled in the system, can be seen in Listing 1.2. The user's client calls the deleteSubscription()-method on the server, which removes the specified subscriber from the user's roster list. Note that the user is not removed from the subscriber's roster list. Instead the removed contact's subscription state to the user is set to None on the server. This will result in the user to always appear offline to the contact.</p><p>By applying these methods to the application, we achieve minimum asymmetry both with respect to presence information and location information. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Summary and Further work</head><p>The work presented here has demonstrated how the principle of minimum asymmetry can be applied as a means of maintaining privacy in a mobile social application. The service uses the XMPP protocol to exchange messages between different users. However, the XMPP standard does not conform to the principle of minimum asymmetry. By using a subset of the standard, we show how we can enforce mutual subscriptions and thus minimum asymmetry.</p><p>A similar system has been developed for the Wi-Fi environment in Wireless Trondheim <ref type="bibr" target="#b8">[9]</ref>. This system has primarily been developed to investigate any behavioural changes in the users when they know the location of their peers and they know that their peers know their location 5 . We expect to conduct similar experiments on a larger scale, using the implemented system described in this paper. The experiment will be conducted using the GSM mobile network in Norway.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">P3 systems: Putting the place back into social networks</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Jones</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Grandhi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet Computing</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="38" to="46" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Privacy by design -principles of privacy-aware ubiquitous systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Langheinrich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Third International Conference on Ubiquitous Computing (UbiComp 2001)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">G</forename><forename type="middle">D</forename><surname>Abowd</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Brumitt</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Shafer</surname></persName>
		</editor>
		<meeting>the Third International Conference on Ubiquitous Computing (UbiComp 2001)</meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2001">2201. 2001</date>
			<biblScope unit="page" from="273" to="291" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Design for privacy in ubiquitous environments</title>
		<author>
			<persName><forename type="first">V</forename><surname>Bellotti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sellen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceeding of the Third European Conference on Computer-Supported Cooperative Work (ECSCW &apos;93)</title>
				<editor>
			<persName><forename type="first">G</forename><forename type="middle">D</forename><surname>Michelis</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Simone</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Schmidt</surname></persName>
		</editor>
		<meeting>eeding of the Third European Conference on Computer-Supported Cooperative Work (ECSCW &apos;93)</meeting>
		<imprint>
			<publisher>Kluwer Academic Publishers</publisher>
			<date type="published" when="1993">1993</date>
			<biblScope unit="page" from="77" to="92" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Approximate information flows: Socially-based modeling of privacy in ubiquitous computing</title>
		<author>
			<persName><forename type="first">X</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">I</forename><surname>Hong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Landay</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 4th International Conference on Ubiquitous Computing (UbiComp 2002)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">G</forename><surname>Borriello</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><forename type="middle">E</forename><surname>Holmquist</surname></persName>
		</editor>
		<meeting>the 4th International Conference on Ubiquitous Computing (UbiComp 2002)</meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">2498</biblScope>
			<biblScope unit="page" from="176" to="193" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Privacy management for social awareness applications</title>
		<author>
			<persName><forename type="first">M</forename><surname>Raento</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Oulasvirta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Workshop on Context Awareness for Proactive Systems (CAPS 2005)</title>
				<editor>
			<persName><forename type="first">P</forename><surname>Floréen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Lindén</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Niklander</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Raatikaine</surname></persName>
		</editor>
		<imprint>
			<publisher>HIIY Publications</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="105" to="114" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Personal privacy through understanding and action: five pitfalls for designers</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lederer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Hong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Dey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Landay</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Personal and Ubiquitous Computing</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="440" to="454" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><surname>Saint-Andre</surname></persName>
		</author>
		<title level="m">Extensible Messaging and Presence Protocol (XMPP): Core. RFC</title>
				<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page">3920</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence</title>
		<author>
			<persName><forename type="first">P</forename><surname>Saint-Andre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">RFC</title>
		<imprint>
			<biblScope unit="volume">3921</biblScope>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Lab and research activities in wireless trondheim</title>
		<author>
			<persName><forename type="first">S</forename><surname>Andresen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Krogstie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Jelle</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of IEEE International Symposium on Wireless Communication Systems</title>
				<meeting>IEEE International Symposium on Wireless Communication Systems</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="385" to="389" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
