TY - GEN
T1 - A framework for the user-oriented personal information protection
AU - Takahashi, Ken'ichi
AU - Sakurai, Kouichi
PY - 2006/12/1
Y1 - 2006/12/1
N2 - Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing environment, in which user's mobile terminal assists in their activity. In the ubiquitous computing environment, user's mobile terminal manages personal information, which is used for negotiations with a service provider. However, various privacy problems, such as information leakage cases, have happened, so that we desire to protect our personal information. We propose a framework for protecting personal information. A basic idea of the framework is to make use of personal information through a program which the owner of personal information knows the behaviour of. We call this program trusted program, because the owner of personal information can trust a way of personal information use. Then, a user offers his/her trusted program to a service provider and compels the service provider to make use of his/her personal information. In this paper, we introduce the framework under the assumption of using an anti-tampering device and propose the method for creating trusted-program.
AB - Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing environment, in which user's mobile terminal assists in their activity. In the ubiquitous computing environment, user's mobile terminal manages personal information, which is used for negotiations with a service provider. However, various privacy problems, such as information leakage cases, have happened, so that we desire to protect our personal information. We propose a framework for protecting personal information. A basic idea of the framework is to make use of personal information through a program which the owner of personal information knows the behaviour of. We call this program trusted program, because the owner of personal information can trust a way of personal information use. Then, a user offers his/her trusted program to a service provider and compels the service provider to make use of his/her personal information. In this paper, we introduce the framework under the assumption of using an anti-tampering device and propose the method for creating trusted-program.
UR - http://www.scopus.com/inward/record.url?scp=66149159100&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=66149159100&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:66149159100
SN - 1601320019
SN - 9781601320018
T3 - Proceedings of The 2006 International Conference on Security and Management, SAM'06
BT - Proceedings of The 2006 International Conference on Security and Management, SAM'06
T2 - 2006 International Conference on Security and Management, SAM'06
Y2 - 26 June 2006 through 29 June 2006
ER -