A framework for protecting private information through user-trusted-program and its realizability

Ken'ichi Takahashi, Kouichi Sakurai, Makoto Amamiya

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Thanks to the spread of mobile technologies, we will be able to realize the ubiquitous computing environment, in which equipment connected to the Internet assists users in their activities without special care on their part. Then, a function to protect private information is needed. This paper proposes a model for protecting private information. The basic idea of our model is to make use of private information through a program which a user trusts. A user offers a trusted program to a partner and compels a partner to make use of his private information through this program. In this way, a user prevents illegal use of his private information.

Original languageEnglish
Title of host publicationEmbedded and Ubiquitous Computing - EUC 2005 Workshops
Subtitle of host publicationUISW, NCUS, SecUbiq, USN, and TAUES, Proceedings
Pages433-442
Number of pages10
DOIs
Publication statusPublished - 2005
EventEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES - Nagasaki, Japan
Duration: Dec 6 2005Dec 9 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3823 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES
CountryJapan
CityNagasaki
Period12/6/0512/9/05

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A framework for protecting private information through user-trusted-program and its realizability'. Together they form a unique fingerprint.

Cite this