A framework for protecting private information through user-trusted-program and its realizability

Ken'ichi Takahashi, Kouichi Sakurai, Makoto Amamiya

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Thanks to the spread of mobile technologies, we will be able to realize the ubiquitous computing environment, in which equipment connected to the Internet assists users in their activities without special care on their part. Then, a function to protect private information is needed. This paper proposes a model for protecting private information. The basic idea of our model is to make use of private information through a program which a user trusts. A user offers a trusted program to a partner and compels a partner to make use of his private information through this program. In this way, a user prevents illegal use of his private information.

Original languageEnglish
Title of host publicationEmbedded and Ubiquitous Computing - EUC 2005 Workshops
Subtitle of host publicationUISW, NCUS, SecUbiq, USN, and TAUES, Proceedings
Pages433-442
Number of pages10
DOIs
Publication statusPublished - Dec 1 2005
EventEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES - Nagasaki, Japan
Duration: Dec 6 2005Dec 9 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3823 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES
CountryJapan
CityNagasaki
Period12/6/0512/9/05

Fingerprint

Private Information
Realizability
Ubiquitous computing
Internet
Mobile Technology
Ubiquitous Computing
Framework
Model

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Takahashi, K., Sakurai, K., & Amamiya, M. (2005). A framework for protecting private information through user-trusted-program and its realizability. In Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings (pp. 433-442). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3823 LNCS). https://doi.org/10.1007/11596042_45

A framework for protecting private information through user-trusted-program and its realizability. / Takahashi, Ken'ichi; Sakurai, Kouichi; Amamiya, Makoto.

Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. 2005. p. 433-442 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3823 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Takahashi, K, Sakurai, K & Amamiya, M 2005, A framework for protecting private information through user-trusted-program and its realizability. in Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3823 LNCS, pp. 433-442, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, 12/6/05. https://doi.org/10.1007/11596042_45
Takahashi K, Sakurai K, Amamiya M. A framework for protecting private information through user-trusted-program and its realizability. In Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. 2005. p. 433-442. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/11596042_45
Takahashi, Ken'ichi ; Sakurai, Kouichi ; Amamiya, Makoto. / A framework for protecting private information through user-trusted-program and its realizability. Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. 2005. pp. 433-442 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{6f639f68c6224907a5dcd140c52ad7ea,
title = "A framework for protecting private information through user-trusted-program and its realizability",
abstract = "Thanks to the spread of mobile technologies, we will be able to realize the ubiquitous computing environment, in which equipment connected to the Internet assists users in their activities without special care on their part. Then, a function to protect private information is needed. This paper proposes a model for protecting private information. The basic idea of our model is to make use of private information through a program which a user trusts. A user offers a trusted program to a partner and compels a partner to make use of his private information through this program. In this way, a user prevents illegal use of his private information.",
author = "Ken'ichi Takahashi and Kouichi Sakurai and Makoto Amamiya",
year = "2005",
month = "12",
day = "1",
doi = "10.1007/11596042_45",
language = "English",
isbn = "3540308032",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "433--442",
booktitle = "Embedded and Ubiquitous Computing - EUC 2005 Workshops",

}

TY - GEN

T1 - A framework for protecting private information through user-trusted-program and its realizability

AU - Takahashi, Ken'ichi

AU - Sakurai, Kouichi

AU - Amamiya, Makoto

PY - 2005/12/1

Y1 - 2005/12/1

N2 - Thanks to the spread of mobile technologies, we will be able to realize the ubiquitous computing environment, in which equipment connected to the Internet assists users in their activities without special care on their part. Then, a function to protect private information is needed. This paper proposes a model for protecting private information. The basic idea of our model is to make use of private information through a program which a user trusts. A user offers a trusted program to a partner and compels a partner to make use of his private information through this program. In this way, a user prevents illegal use of his private information.

AB - Thanks to the spread of mobile technologies, we will be able to realize the ubiquitous computing environment, in which equipment connected to the Internet assists users in their activities without special care on their part. Then, a function to protect private information is needed. This paper proposes a model for protecting private information. The basic idea of our model is to make use of private information through a program which a user trusts. A user offers a trusted program to a partner and compels a partner to make use of his private information through this program. In this way, a user prevents illegal use of his private information.

UR - http://www.scopus.com/inward/record.url?scp=33744934526&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33744934526&partnerID=8YFLogxK

U2 - 10.1007/11596042_45

DO - 10.1007/11596042_45

M3 - Conference contribution

AN - SCOPUS:33744934526

SN - 3540308032

SN - 9783540308034

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 433

EP - 442

BT - Embedded and Ubiquitous Computing - EUC 2005 Workshops

ER -