A framework for the user-oriented personal information protection

Ken'ichi Takahashi, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing environment, in which user's mobile terminal assists in their activity. In the ubiquitous computing environment, user's mobile terminal manages personal information, which is used for negotiations with a service provider. However, various privacy problems, such as information leakage cases, have happened, so that we desire to protect our personal information. We propose a framework for protecting personal information. A basic idea of the framework is to make use of personal information through a program which the owner of personal information knows the behaviour of. We call this program trusted program, because the owner of personal information can trust a way of personal information use. Then, a user offers his/her trusted program to a service provider and compels the service provider to make use of his/her personal information. In this paper, we introduce the framework under the assumption of using an anti-tampering device and propose the method for creating trusted-program.

Original languageEnglish
Title of host publicationProceedings of The 2006 International Conference on Security and Management, SAM'06
Publication statusPublished - Dec 1 2006
Event2006 International Conference on Security and Management, SAM'06 - Las Vegas, NV, United States
Duration: Jun 26 2006Jun 29 2006

Publication series

NameProceedings of The 2006 International Conference on Security and Management, SAM'06

Other

Other2006 International Conference on Security and Management, SAM'06
Country/TerritoryUnited States
CityLas Vegas, NV
Period6/26/066/29/06

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'A framework for the user-oriented personal information protection'. Together they form a unique fingerprint.

Cite this